1. Right Answer: B
Explanation: Back-Chaining propagation requires an attack toolkit to be installed on the attacker-s machine. When an attacker exploits the vulnerable machine; it opens the connection on the infected system to accept the file transfer request. Then, the toolkit is copied from the attacker-s machine. Once the toolkit is installed on the infected system, it will search for other vulnerable systems, and the process will continue.
2. Right Answer: E
Explanation: Following are the most common attack areas for IoT network: Device Memory containing credentials Access Control Firmware Extraction Privileges Escalation Resetting -I am resettingΓΒ to an insecure state Removal of storage media Web Attacks Firmware Attacks Network Services Attacks Unencrypted Local Data Storage Confidentiality and Integrity Issues Cloud Computing Attacks Malicious updates Insecure APIs Mobile Application Threats
3. Right Answer: B
Explanation: BlueBorne Attack is performed using different techniques to exploit Bluetooth vulnerabilities. This collection of techniques to gain unauthorized access to Bluetooth enabled devices is called a Blueborne attack.
4. Right Answer: C
Explanation: The attack is DNS cache poisoning, which is also called DNS spoofing.
5. Right Answer: B
Explanation: tcpdump is a command-line exclusive tool that allows sniffing network traffic and packet. Dumps (PCAP files) can be created to and from a given network interface or host.