Match the description with the most accurate attack type.
x : DDoS | A DoS (Denial of Service) occurs when a service is unavailable due to the effects of a third-party. A DDoS (Distributed Denial of Service) occurs when multiple third-parties work together to create a service outage. |
x : On-path | On-path attacks are quite effective because the attacker can often sit invisibly between two devices and gather useful information or modify the data streams in real-time. |
x : Spoofing | Spoofing happens any time a device pretends to be another device. If a DNS server has been modified to hand out the IP address of a different server, then it's spoofing the IP address of the attacker. |
x : Spam |
Spam
|
x : Hoax |
Computer hoaxes
|
✓ : Vishing | Social engineering over the telephone continues to be an effective attack vector, and obtaining personal information such as a bank account or birth date would be considered phishing over voice, or vishing. |
x : Supply Chain | A supply chain attack infects part of the product manufacturing process in an attempt to also infect everything further down the chain. An industry trade event would not be a common vector for a supply chain attack. |
x : Social Engineering |
Secure Network Time Protocol (NTPsec). Time synchronization
|
x | |
x | |
x | |
x | |
x | |
✓ | |
x | |
x |