• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

In the category of hacking action that is defined by VERIS, which three attacks can be classified under the variety attribute? (Choose three.)

  • man-in-the-middle attacks
  • rootkit
  • remote file inclusion
  • VPN
  • command shell
  • web application
  • buffer overflow
Explanation & Hint:

In the category of hacking actions as defined by VERIS (Vocabulary for Event Recording and Incident Sharing), which covers various methods of technical intrusion, the three attacks that can be classified under the variety attribute are:

  1. Man-in-the-Middle Attacks: This type of attack involves an attacker secretly intercepting and possibly altering the communication between two parties who believe they are directly communicating with each other.
  2. Remote File Inclusion: This attack allows an attacker to include a remote file, usually through a script on the web server. This can lead to data theft, server compromise, and other malicious activities.
  3. Buffer Overflow: This attack occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than it is allocated, potentially leading to arbitrary code execution.

Other options like rootkit, VPN, command shell, and web application, while related to cybersecurity, describe different concepts or tools rather than specific types of hacking attacks. Rootkit is a type of malware, VPN is a network security technology, command shell is an interface for system access, and web application refers to a type of software.

For more Questions and Answers:

Threat Response Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments