A junior administrator comes to you in a panic. After looking at the log files, he has become convinced that an attacker is attempting to use an IP address to replace another system in the network to gain access. Which type of attack is this?

A junior administrator comes to you in a panic. After looking at the log files, he has become convinced that an attacker is attempting to use an IP address to replace another system in the network to gain access. Which type of attack is this?




a. Man-in-the-middle attack
b. Backdoor attack
c. Worm
d. TCP/IP hijacking



Answer: D

TCP/IP hijacking is an attempt to steal a valid IP address and use it to gain authorization or information from a network.


Learn More :