After attending a security conference, your manager wants you to perform research on types of attacks whereby the attacker reuses an attack that has worked on other organizations. It is very important to your manager that you learn as much about this type of attack as possible. What is this type of attack called?
A. birthday attack
B. target of opportunity
C. zero-day attack
D. drive-by attack
B
Explanation: This type of attack is referred to as a target of opportunity attack. Once an attack has been successful on a particular device, attackers often try to locate other targets that use the same device to see if the same attack is successful.
Birthday attacks attempt to match a single element. Zero-day attacks are carried out on the same day a vulnerability has been discovered and before the vendor has had time to deploy a security fix. A drive-by attack occurs when malware is left out in such a way that it is picked up while Web browsing.
You might also like to view...
DDR3 is a type of ________
Fill in the blank(s) with correct word
What will a Windows 7 Professional client do with an IPv6 temporary address after 24 hours?
A. perform a release and renew B. request a new address C. regenerate the address D. initiate a DAD test