
It mirrors traffic that passes through a switch port or VLAN to another port for traffic analysis.What functionality is provided by Cisco SPAN in a switched network? Eventually the target host is overwhelmed with half-open TCP connections and denies TCP services.Ģ1. The target device replies with a TCP SYN-ACK packet to the spoofed IP address and waits for a TCP ACK packet. The threat actor continually sends TCP SYN session request packets with a randomly spoofed source IP address to an intended target. a State-Sponsored threat actor who steals government secrets and sabotages networks of foreign governmentsĮxplanation: The TCP SYN Flood attack exploits the TCP three-way handshake.a threat actor publicly protesting against governments by posting articles and leaking sensitive information.a threat actor attempting to discover exploits and report them to vendors, sometimes for prizes or rewards.a teenager running existing scripts, tools, and exploits, to cause harm, but typically not for profit.What scenario describes a vulnerability broker?

State-sponsored : threat actors who steal government secrets, gather intelligence, and sabotage networks of foreign governments, terrorist groups, and corporationsġ4.


Fast flux is a technique used to hide phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts (bots within botnets). Explanation: Fast flux, double IP flux, and domain generation algorithms are used by cybercrimals to attack DNS servers and affect DNS services.
