Q: 6
What kind of attack is likely to occur when a hacker intercepts and redirects traffic by spoofing the IP
address of a corporate server?
Options
Discussion
Option A makes sense. Spoofing an IP to intercept and redirect traffic screams on-path attack (aka MITM). B is tempting if they mention ongoing access, but here it's all about interception. Anyone disagree or think spyware fits here? I'm pretty sure this lines up with ISC2 lingo from practice.
Its A, had something like this in a mock before. Redirecting traffic with IP spoofing is a textbook on-path attack.
Sounds like classic MITM using IP spoofing, which lines up with A. Official study guide covers this type of scenario. Anyone else seen it phrased differently on practice tests?
Be respectful. No spam.
Question 6 of 35