• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

In the category of hacking action that is defined by VERIS, which three attacks can be classified under the vector attribute? (Choose three.)

  • man-in-the-middle attacks
  • rootkit
  • VPN
  • remote file injection
  • command shell
  • web application
  • buffer overflow
Explanation & Hint:

In the category of hacking actions as defined by VERIS (Vocabulary for Event Recording and Incident Sharing), the vector attribute refers to the method or path used to conduct the attack. Among the options provided, the three attacks that can be classified under the vector attribute are:

  1. Web Application: This vector involves exploiting vulnerabilities in web applications, such as SQL injection, cross-site scripting, and other web-based attack techniques.
  2. Command Shell: This refers to attacks that gain access to a system’s command shell (or command line interface), allowing the attacker to execute commands directly on the affected system.
  3. Remote File Injection: This vector involves injecting a file (often malicious) into a system remotely, typically exploiting a vulnerability that allows the attacker to upload or modify files on the target system.

Other options like man-in-the-middle attacks, rootkit, VPN, and buffer overflow, while relevant to hacking, are not vectors in the same sense. Man-in-the-middle attacks and buffer overflow are more specific types of attacks, a rootkit is a type of malware, and a VPN is a network security technology. The vector attribute in the context of hacking actions in VERIS typically refers to the pathways or methods of attack delivery and execution.

For more Questions and Answers:

Threat Response Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments