A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. Upon investigation, a security analyst identifies the following: The legitimate website's IP address is 10.1.1.20 and eRecruit.local resolves to this IP. The forged website's IP address appears to be 10.2.12.99, based on NetFlow records. All three of the organization's DNS servers show the website correctly resolves to the legitimate IP. DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise. Which of the following MOST likely occurred?
A) A reverse proxy was used to redirect network traffic.
B) An SSL strip MITM attack was performed.
C) An attacker temporarily poisoned a name server.
D) An ARP poisoning attack was successfully executed.
Correct Answer:
Verified
Q73: A user received an SMS on a
Q74: An enterprise has hired an outside security
Q75: The SOC is reviewing processes and procedures
Q76: A security incident may have occurred on
Q77: Which of the following will provide the
Q79: A local coffee shop runs a small
Q80: Which of the following is a team
Q81: A pharmaceutical sales representative logs on to
Q82: A security analyst receives a SIEM alert
Q83: Phishing and spear-phishing attacks have been occurring
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents