Arman transferred some money to his friend's account using a net banking service. After a few hours, his friend informed him that he hadn't received the money yet. Arman logged on to the bank's website to investigate and discovered that the amount had been transferred to an unknown account instead. The bank, upon receiving Arman's complaint, discovered that someone had established a station between Arman's and the bank server's communication system. The station intercepted the communication and inserted another account number replacing his friend's account number. What is
such an attack called?
Answer : C
The scenario described is a classic example of a Man-in-the-Middle (MitM) attack. In this type of cyberattack, the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. The attacker has inserted themselves between the two parties, in this case, Arman and the bank's server, and has intercepted the communication to redirect the funds to a different account. This type of attack can occur in various forms, such as eavesdropping on or altering the communication over an insecure network service, but it is characterized by the attacker's ability to intercept and modify the data being exchanged without either legitimate party noticing.
A popular e-commerce company has recently received a lot of complaints from its customers. Most
of the complaints are about the customers being redirected to some other website when trying to
access the e-com site, leading to all their systems being compromised and corrupted. Upon
investigation, the network admin of the firm discovered that some adversary had manipulated the
company's IP address in the domain name server's cache. What is such an attack called?
Answer : A
The attack described is known as DNS Poisoning, also referred to as DNS Spoofing. This type of attack occurs when an attacker manipulates the DNS server's cache, so that the server returns an incorrect IP address for a website. This results in users being redirected to malicious websites instead of the intended destination. The attacker's goal is typically to spread malware, steal personal information, or disrupt services. DNS Poisoning is a serious security threat because it can be used to compromise entire networks and is difficult to detect.
An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both
detect and stop malicious traffic?
Answer : D
The deployment mode that allows an Intrusion Detection System (IDS) or Intrusion Detection and Prevention System (IDPS) to both detect and stop malicious traffic is known as inline mode. In this mode, the IDS/IDPS is placed directly in the network's traffic flow. All traffic must pass through the system, allowing it to inspect packets in real-time and take immediate action to block potential threats before they reach their destination. This contrasts with promiscuous or passive modes, where the system only monitors and alerts on traffic without the ability to intervene directly.
Which of the following incident handling stage removes the root cause of the incident?
Answer : A
The eradication stage in incident handling is responsible for removing the root cause of the incident. This stage involves identifying and eliminating the threats that caused the incident, such as malware or unauthorized access. It also includes patching vulnerabilities and strengthening security controls to prevent similar incidents in the future. The goal of eradication is to ensure that the incident is completely resolved and cannot recur.
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from certain region. You suspect a DoS incident on the network.
What will be your first reaction as a first responder?
Which of the following Layers of IoT Architecture provides dashboards to monitor, analyze, and implement proactive decisions?
Answer : D
In the context of IoT Architecture, the Process Layer is responsible for providing dashboards that are used to monitor, analyze, and implement proactive decisions. This layer encompasses the software platforms and applications that process the data collected from the devices. It is within this layer that data is turned into actionable insights and where dashboards are typically found, allowing for real-time monitoring and analysis, as well as the ability to make proactive decisions based on the processed information.
Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?
Answer : B
In RAID storage, striping is the technique that divides data into blocks and spreads them across multiple drives in the RAID array. This method enhances performance by allowing the drives to read and write data simultaneously, effectively increasing throughput and speed. Unlike mirroring, which duplicates data across drives, or parity, which provides redundancy, striping solely focuses on performance by distributing data across the RAID system without redundancy.