Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

Which two characteristics represent a blended threat? (Choose two.)

<p>A. man-in-the-middle attack</p> <p>B. trojan horse attack</p> <p>C. pharming attack</p> <p>D. denial of service attack</p> <p>E. day zero attack</p>

user-image
Question added by Ayoub Tartir , PMP, GWCPgM, CISA, CISSP, CAP, CSSLP, FITSP-D, CEH, CHFI, CCNA, CCNA Security, Security+, Network+ , IT Security Expert , Information Unlimited Inc. (IUI)
Date Posted: 2014/09/28
Jayakrishnan C P
by Jayakrishnan C P , Security Service Manager , Metmox Inc

B. trojan horse attack

E. day zero attack

Mohamed Asik Uthumalebbe
by Mohamed Asik Uthumalebbe , System test Engineer , MADAR HOLDING

blended attack mean more than one mean of propagating or performing attack so that the answer is A & D

E- the Zero day attack - means exploitation of vulnerabilities relatively very new - but it could be blended or not

Milan Rai
by Milan Rai , IT Support Officer , Sass & Bide

A & D

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.