Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > HP > Aruba-ACNSA > HPE6-A78

HPE6-A78 Aruba Certified Network Security Associate Exam Question and Answers

Question # 4

A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a certificate that includes these properties:

    Subject name: myhost.example.com

    SAN: DNS: myhost.example.com; DNS: myhost1.example.com

    Extended Key Usage (EKU): Server authentication

    Issuer: MyCA_SigningThe server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyCA. The client’s Trusted CA Certificate list does not include the MyCA or MyCA_Signing certificates.Which factor or factors prevent the client from trusting the certificate?

A.

The client does not have the correct trusted CA certificates.

B.

The certificate lacks a valid SAN.

C.

The certificate lacks the correct EKU.

D.

The certificate lacks a valid SAN, and the client does not have the correct trusted CA certificates.

Full Access
Question # 5

What is one way that WPA3-PerSonal enhances security when compared to WPA2-Personal?

A.

WPA3-Perscn3i is more secure against password leaking Because all users nave their own username and password

B.

WPA3-Personai prevents eavesdropping on other users' wireless traffic by a user who knows the passphrase for the WLAN.

C.

WPA3-Personai is more resistant to passphrase cracking Because it requires passphrases to be at least 12 characters

D.

WPA3-Personal is more complicated to deploy because it requires a backend authentication server

Full Access
Question # 6

A client is connected to a Mobility Controller (MC). These firewall rules apply to this client’s role:

ipv4 any any svc-dhcp permit

ipv4 user 10.5.5.20 svc-dns permit

ipv4 user 10.1.5.0 255.255.255.0 https permit

ipv4 user 10.1.0.0 255.255.0.0 https deny_opt

ipv4 user any any permit

What correctly describes how the controller treats HTTPS packets to these two IP addresses, both of which are on the other side of the firewall:

10.1.20.1

10.5.5.20

A.

Both packets are denied.

B.

The first packet is permitted, and the second is denied.

C.

Both packets are permitted.

D.

The first packet is denied, and the second is permitted.

Full Access
Question # 7

What is a correct use case for using the specified certificate file format?

A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Full Access
Question # 8

You have been instructed to look in an AOS Security Dashboard’s client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

A.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Suspected Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Interfering

D.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Suspected Rogue

Full Access
Question # 9

What are the roles of 802.1X authenticators and authentication servers?

A.

The authenticator stores the user account database, while the server stores access policies.

B.

The authenticator supports only EAP, while the authentication server supports only RADIUS.

C.

The authenticator is a RADIUS client and the authentication server is a RADIUS server.

D.

The authenticator makes access decisions and the server communicates them to the supplicant.

Full Access
Question # 10

What is a guideline for creating certificate signing requests (CSRs) and deploying server Certificates on ArubaOS Mobility Controllers (MCs)?

A.

Create the CSR online using the MC Web Ul if your company requires you to archive the private key.

B.

if you create the CSR and public/private Keypair offline, create a matching private key online on the MC.

C.

Create the CSR and public/private keypair offline If you want to install the same certificate on multiple MCs.

D.

Generate the private key online, but the public key and CSR offline, to install the same certificate on multiple MCs.

Full Access
Question # 11

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Full Access
Question # 12

You are troubleshooting an authentication issue for HPE Aruba Networking switches that enforce 802.1X to a cluster of HPE Aruba Networking ClearPass Policy Manager (CPPMs). You know that CPPM is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics. However, you cannot find the record for the Access-Rejects in CPPM Access Tracker.

What is something you can do to look for the records?

A.

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

B.

Verify that you are logged in to the CPPM UI with read-write, not read-only, access.

C.

Make sure that CPPM cluster settings are configured to show Access-Rejects.

D.

Click Edit in Access Viewer and make sure that the correct servers are selected.

Full Access
Question # 13

A company has an ArubaOS controller-based solution with a WPA3-Enterprise WLAN. which authenticates wireless clients to Aruba ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication A user's Windows domain computer has had certificates installed on it However, the Networks and Connections window shows that authentication has tailed for the user. The Mobility Controllers (MC's) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can you look for deeper insight into why this authentication attempt is failing?

A.

the reports generated by Aruba ClearPass Insight

B.

the RADIUS events within the CPPM Event Viewer

C.

the Alerts tab in the authentication record in CPPM Access Tracker

D.

the packets captured on the MC control plane destined to UDP 1812

Full Access
Question # 14

Refer to the exhibit, which shows the settings on the company’s MCs.

— Mobility Controller

Dashboard General Admin AirWave CPSec Certificates

Configuration

WLANsv Control Plane Security

Roles & PoliciesEnable CP Sec

Access PointsEnable auto cert provisioning:

You have deployed about 100 new Aruba 335-APs. What is required for the APs to become managed?

A.

installing CA-signed certificates on the APs

B.

installing self-signed certificates on the APs

C.

approving the APs as authorized APs on the AP whitelist

D.

configuring a PAPI key that matches on the APs and MCs

Full Access
Question # 15

Refer to the exhibit.

Device A is establishing an HTTPS session with the Arubapedia web sue using Chrome. The Arubapedia web server sends the certificate shown in the exhibit

What does the browser do as part of vacating the web server certificate?

A.

It uses the public key in the DigCen SHA2 Secure Server CA certificate to check the certificate's signature.

B.

It uses the public key in the DigCert root CA certificate to check the certificate signature

C.

It uses the private key in the DigiCert SHA2 Secure Server CA to check the certificate's signature.

D.

It uses the private key in the Arubapedia web site's certificate to check that certificate's signature

Full Access
Question # 16

You have a network with ArubaOS-Switches for which Aruba ClearPass Policy Manager (CPPM) is acting as a TACACS+ server to authenticate managers. CPPM assigns the admins a TACACS+ privilege level, either manager or operator. You are now adding ArubaOS-CX switches to the network. ClearPass admins want to use the same CPPM service and policies to authenticate managers on the new switches.

What should you explain?

A.

This approach cannot work because the ArubaOS-CX switches do not accept standard TACACS+ privilege levels.

B.

This approach cannot work because the ArubaOS-CX switches do not support TACACS+.

C.

This approach will work, but will need to be adjusted later if you want to assign managers to the default auditors group.

D.

This approach will work to assign admins to the default "administrators" group, but not to the default "operators" group.

Full Access
Question # 17

Which correctly describes a way to deploy certificates to end-user devices?

A.

ClearPass Onboard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain

B.

ClearPass Device Insight can automatically discover end-user devices and deploy the proper certificates to them

C.

ClearPass OnGuard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain

D.

in a Windows domain, domain group policy objects (GPOs) can automatically install computer, but not user certificates

Full Access
Question # 18

What is a benefit of deploying HPE Aruba Networking ClearPass Device Insight?

A.

Highly accurate endpoint classification for environments with many device types, including Internet of Things (IoT)

B.

Simpler troubleshooting of ClearPass solutions across an environment with multiple ClearPass Policy Managers

C.

Visibility into devices’ 802.1X supplicant settings and automated certificate deployment

D.

Agent-based analysis of devices’ security settings and health status, with the ability to implement quarantining

Full Access
Question # 19

What is one of the policies that a company should define for digital forensics?

A.

which data should be routinely logged, where logs should be forwarded, and which logs should be archived

B.

what are the first steps that a company can take to implement micro-segmentation in their environment

C.

to which resources should various users be allowed access, based on their identity and the identity of their clients

D.

which type of EAP method is most secure for authenticating wired and wireless users with 802.1

Full Access
Question # 20

You have a network with AOS-CX switches for which HPE Aruba Networking ClearPass Policy Manager (CPPM) acts as the TACACS+ server. When an admin authenticates, CPPM sends a response with:

    Aruba-Priv-Admin-User = 1

    TACACS+ privilege level = 15What happens to the user?

A.

The user receives auditors access.

B.

The user receives no access.

C.

The user receives administrators access.

D.

The user receives operators access.

Full Access
Question # 21

Your HPE Aruba Networking Mobility Master-based solution has detected a rogue AP. Among other information, the AOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

A.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP is an AP that belongs to your solution. However, the AOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

D.

The AP has a BSSID that is close to your authorized APs’ BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

Full Access
Question # 22

You have an Aruba Mobility Controller (MC) that is locked in a closet. What is another step that Aruba recommends to protect the MC from unauthorized access?

A.

Use local authentication rather than external authentication to authenticate admins.

B.

Change the password recovery password.

C.

Set the local admin password to a long random value that is unknown or locked up securely.

D.

Disable local authentication of administrators entirely.

Full Access
Question # 23

Which is a correct description of a stage in the Lockheed Martin kill chain?

A.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes its function.

B.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

C.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfiltrated.

D.

In the delivery stage, malware collects valuable data and delivers or exfiltrates it to the hacker.

Full Access
Question # 24

What is a consideration for implementing wireless containment in response to unauthorized devices discovered by ArubaOS Wireless Intrusion Detection (WIP)?

A.

It is best practice to implement automatic containment of unauthorized devices to eliminate the need to locate and remove them.

B.

Wireless containment only works against unauthorized wireless devices that connect to your corporate LAN, so it does not offer protection against Interfering APs.

C.

Your company should consider legal implications before you enable automatic containment or implement manual containment.

D.

Because wireless containment has a lower risk of targeting legitimate neighbors than wired containment, it is recommended in most use cases.

Full Access
Question # 25

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker connects a device to the same wireless network as the client and responds to the client’s ARP requests with the hacker device’s MAC address.

D.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

Full Access
Question # 26

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Full Access
Question # 27

An MC has a WLAN that enforces WPA3-Enterprise with authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The WLAN's default role is set to guest. A Mobility Controller (MC) has these roles configured on it:

    authenticated

    denyall

    guest

    general-access

    guest-logon

    logon

    stateful-dot1x

    switch-logon

    voiceA client authenticates. CPPM returns an Access-Accept with an Aruba-User-Role VSA set to general_access. What role does the client receive?

A.

guest

B.

logon

C.

general-access

D.

authenticated

Full Access
Question # 28

You have an HPE Aruba Networking Mobility Controller (MC) that is locked in a closet. What is another step that HPE Aruba Networking recommends to protect the MC from unauthorized access?

A.

Set the local admin password to a long random value that is unknown or locked up securely.

B.

Disable local authentication of administrators entirely.

C.

Change the password recovery password.

D.

Use local authentication rather than external authentication to authenticate admins.

Full Access
Question # 29

You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?

A.

Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.

B.

Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.

C.

Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.

D.

Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.

Full Access
Question # 30

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings" definition in the ArubaOS Diagnostics > System > Log Settings page?

A.

Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level

B.

Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.

C.

Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory

D.

Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers

Full Access
Question # 31

You need to deploy an Aruba instant AP where users can physically reach It. What are two recommended options for enhancing security for management access to the AP? (Select two )

A.

Disable Its console ports

B.

Place a Tamper Evident Label (TELS) over its console port

C.

Disable the Web Ul.

D.

Configure WPA3-Enterpnse security on the AP

E.

install a CA-signed certificate

Full Access
Question # 32

What is one way that Control Plane Security (CPsec) enhances security for me network?

A.

It protects wireless clients' traffic tunneled between APs and Mobility Controllers, from eavesdropping

B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs") control plane.

C.

It prevents access from unauthorized IP addresses to critical services, such as SSH on Mobility Controllers (MCs).

D.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

Full Access
Question # 33

What is a benefit of Opportunistic Wireless Encryption (OWE)?

A.

It allows both WPA2-capable and WPA3-capable clients to authenticate to the same WPA-Personal WLAN.

B.

It offers more control over who can connect to the wireless network when compared with WPA2-Personal.

C.

It allows anyone to connect, but provides better protection against eavesdropping than a traditional open network.

D.

It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MITM) attacks.

Full Access
Question # 34

Refer to the exhibit.

You have set up a RADIUS server on an ArubaOS Mobility Controller (MC) when you created a WLAN named "MyEmployees .You now want to enable the MC to accept change of authorization (CoA) messages from this server for wireless sessions on this WLAN.

What Is a part of the setup on the MC?

A.

Create a dynamic authorization, or RFC 3576, server with the 10.5.5.5 address and correct shared secret.

B.

Install the root CA associated with the 10 5.5.5 server's certificate as a Trusted CA certificate.

C.

Configure a ClearPass username and password in the MyEmployees AAA profile.

D.

Enable the dynamic authorization setting in the "clearpass" authentication server settings.

Full Access
Question # 35

You are checking the Security Dashboard in the Web UI for your AOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

A.

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

B.

It could open a backdoor into the corporate LAN for unauthorized users.

C.

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

D.

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

Full Access
Question # 36

Which is a correct description of a Public Key Infrastructure (PKI)?

A.

A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.

B.

A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.

C.

Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.

D.

A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.

Full Access
Question # 37

What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)?

A.

applying firewall policies and deep packet inspection to wired clients

B.

enhancing the security of communications from the access layer to the core with data encryption

C.

securing the network infrastructure control plane by creating a virtual out-of-band-management network

D.

simplifying network infrastructure management by using the MC to push configurations to the switches

Full Access
Question # 38

What is a benefit of Opportunistic Wireless Encryption (OWE)?

A.

It allows both WPA2-capabie and WPA3-capable clients to authenticate to the same WPA-Personal WLAN

B.

It offers more control over who can connect to the wireless network when compared with WPA2-Personal

C.

It allows anyone lo connect, but provides better protection against eavesdropping than a traditional open network

D.

It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MUM) attacks

Full Access
Question # 39

A company has an Aruba Instant AP cluster. A Windows 10 client is attempting to connect a WLAN that enforces WPA3-Enterprise with authentication to ClearPass Policy Manager (CPPM). CPPM is configured to require EAP-TLS. The client authentication fails. In the record for this client’s authentication attempt on CPPM, you see this alert.

What is one thing that you check to resolve this issue?

A.

whether the client has a third-party 802.1 X supplicant, as Windows 10 does not support EAP-TLS

B.

whether the client has a valid certificate installed on it to let it support EAP-TLS

C.

whether EAP-TLS is enabled in the SSID Profile settings for the WLAN on the IAP cluster

D.

whether EAP-TLS is enabled in the AAA Profile settings for the WLAN on the IAP cluster

Full Access
Question # 40

How can ARP be used to launch attacks?

A.

Hackers can use ARP to change their NIC's MAC address so they can impersonate legiti-mate users.

B.

Hackers can exploit the fact that the port used for ARP must remain open and thereby gain remote access to another user's device.

C.

A hacker can use ARP to claim ownership of a CA-signed certificate that actually belongs to another device.

D.

A hacker can send gratuitous ARP messages with the default gateway IP to cause devices to redirect traffic to the hacker's MAC address.

Full Access
Question # 41

Which is an accurate description of a type of malware?

A.

Worms are usually delivered in spear-phishing attacks and require users to open and run a file.

B.

Rootkits can help hackers gain elevated access to a system and often actively conceal themselves from detection.

C.

A Trojan is any type of malware that replicates itself and spreads to other systems automatically.

D.

Malvertising can only infect a system if the user encounters the malware on an untrustworthy site.

Full Access
Question # 42

You have configured a WLAN to use Enterprise security with the WPA3 version.

How does the WLAN handle encryption?

A.

Traffic is encrypted with TKIP and keys derived from a PMK shared by all clients on the WLAN.

B.

Traffic is encrypted with TKIP and keys derived from a unique PMK per client.

C.

Traffic is encrypted with AES and keys derived from a PMK shared by all clients on the WLAN.

D.

Traffic is encrypted with AES and keys derived from a unique PMK per client.

Full Access
Question # 43

A company has an ArubaOS solution. The company wants to prevent users assigned to the "user_group1" role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

A.

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the "user_groupr role.

B.

Create ALGs for the gaming and peer-to-peer applications, and deny the "user_group1" role on the ALGs.

C.

Add access control rules to the "user_group1" role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.

D.

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the "user_group" rules.

Full Access
Question # 44

Refer to the exhibit, which shows the settings on the company's MCs.

You have deployed about 100 new HPE Aruba Networking 335 APs. What is required for the APs to become managed?

A.

Installing CA-signed certificates on the APs

B.

Approving the APs as authorized APs on the AP whitelist

C.

Installing self-signed certificates on the APs

D.

Configuring a PAPI key that matches on the APs and MCs

Full Access
Question # 45

What is one of the roles of the network access server (NAS) in the AAA framewonx?

A.

It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.

B.

It negotiates with each user's device to determine which EAP method is used for authentication

C.

It enforces access to network services and sends accounting information to the AAA server

D.

It determines which resources authenticated users are allowed to access and monitors each users session

Full Access
Question # 46

What is one way a honeypot can be used to launch a man-in-the-middle (MITM) attack to wireless clients?

A.

It uses ARP poisoning to disconnect wireless clients from the legitimate wireless network and force clients to connect to the hacker’s wireless network instead.

B.

It runs an NMap scan on the wireless client to find the client's MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

It uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

D.

It examines wireless clients' probes and broadcasts the SSIDs in the probes, so that wireless clients will connect to it automatically.

Full Access
Question # 47

What is the purpose of an Enrollment over Secure Transport (EST) server?

A.

It acts as an intermediate Certification Authority (CA) that signs end-entity certificates.

B.

It helps admins to avoid expired certificates with less management effort.

C.

It provides a secure central repository for private keys associated with devices' digital certif-icates.

D.

It provides a more secure alternative to private CAs at less cost than a public CA.

Full Access
Question # 48

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. The company is contemplating the use of ClearPass’s TCP fingerprinting capabilities.

What is a consideration for using those capabilities?

A.

ClearPass admins will need to provide the credentials of an API admin account to configure on Aruba devices.

B.

You will need to mirror traffic to one of CPPM's span ports from a device such as a core routing switch.

C.

ArubaOS-CX switches do not offer the support necessary for CPPM to use TCP fingerprinting on wired endpoints.

D.

TCP fingerprinting of wireless endpoints requires a third-party Mobility Device Management (MDM) solution.

Full Access
Question # 49

What is social engineering?

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Full Access
Question # 50

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

Full Access