exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 135 discussion

Actual exam question from CompTIA's SY0-601
Question #: 135
Topic #: 1
[All SY0-601 Questions]

An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?

  • A. On-path attack
  • B. Protocol poisoning
  • C. Domain hijacking
  • D. Bluejacking
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Josh_Feng
Highly Voted 2 years, 10 months ago
Selected Answer: A
On path attack is often known as man in the middle.
upvoted 16 times
banditring
2 years, 9 months ago
I was getting confused as to what an on path attack is
upvoted 5 times
NerdAlert
2 years, 3 months ago
just think - the attacker is on the same path as the victim and their destination, just in the middle between them
upvoted 9 times
...
...
...
Kraken84
Highly Voted 1 year, 10 months ago
" eavesdropping " LISTENING IN..... MITM.....
upvoted 7 times
...
dbdbfb0
Most Recent 1 year, 4 months ago
Selected Answer: A
Domain hijacking typically involves unauthorized changes to the registration of a domain name, redirecting traffic meant for a legitimate website to a different site controlled by the attacker. In this scenario, the attack involves eavesdropping on the user's activity and spoofing the IP address of the shopping site to intercept sensitive information, leading to unauthorized purchases. Therefore, the correct answer is an on-path attack, not domain hijacking.
upvoted 3 times
...
ApplebeesWaiter1122
1 year, 11 months ago
Selected Answer: A
In an on-path attack, also known as a Man-in-the-Middle (MITM) attack, the attacker intercepts and relays communication between two parties, making them believe they are communicating directly with each other. The attacker can eavesdrop on the communication and even modify the data transmitted between the parties. In this scenario, the attacker was eavesdropping on the user's online shopping session, and by spoofing the IP address associated with the shopping site, they could intercept the user's communication with the site. The attacker then modified the data, resulting in the user receiving an email regarding unusual purchases on their credit card statement, which the attacker may have initiated.
upvoted 1 times
...
Protract8593
1 year, 11 months ago
Selected Answer: A
Based on the information provided, the attack that took place is a: A. On-path attack In an on-path attack (also known as a man-in-the-middle attack), the attacker intercepts and relays communication between two parties. In this scenario, the attacker eavesdropped on the user's communication with the shopping site and spoofed the IP address to trick the user into thinking they were communicating with the legitimate site while in reality, the attacker was in the middle of the communication. As a result, the attacker was able to obtain the user's credit card information and conduct unauthorized purchases, leading to the unusual credit card statement.
upvoted 2 times
Protract8593
1 year, 11 months ago
The other options are not applicable to the given scenario: B. Protocol poisoning: This term is not commonly used, and it is not specifically related to the attack described in the scenario. C. Domain hijacking: Domain hijacking typically involves unauthorized changes to a domain's registration settings, which is not mentioned in the scenario. D. Bluejacking: Bluejacking refers to the practice of sending unsolicited messages or data over Bluetooth to a user's mobile device. It is unrelated to the eavesdropping and IP spoofing described in the scenario. Therefore, the correct answer is: A. On-path attack
upvoted 1 times
...
...
MasterControlProgram
2 years, 3 months ago
Selected Answer: A
A. On-path attack. The attacker was able to intercept and manipulate the communication between the user and the shopping site by spoofing the IP address, leading to the interception of the user's credit card information.
upvoted 2 times
...
Omi0204
2 years, 3 months ago
Answer is B. DNS Highjacking and DNS spoofing/poisoning are the type of On-path attack. Now read this:- DNS spoofing/cache poisoning: This is an attack where forged DNS data is introduced into a DNS resolver’s cache, resulting in the resolver returning an incorrect IP address for a domain. Instead of going to the correct website, traffic can be diverted to a malicious machine or anywhere else the attacker desires; often this will be a replica of the original site used for malicious purposes such as distributing malware or collecting login information. In this question, IP spoofed and traffic diverted to the spoofed IP where attacker already craeted a replica copy of actual website. When use entered his/her credit card details, it was collected by attacker and then later on used user create card with collected information to make the purchase and then user received email with credit card statement.
upvoted 3 times
...
medulan
2 years, 4 months ago
Selected Answer: A
If victim paid for example for shopping 50$ and it went to some other account then yes hijacking but there was many payments made for different stuff what suggests someone had his card details hence on-path attack
upvoted 1 times
...
Boubou480
2 years, 5 months ago
Selected Answer: C
C. Domain hijacking Domain hijacking refers to the unauthorized acquisition of control over a domain name. In this case, the attacker was able to spoof the IP address associated with the shopping site, which means they were able to redirect traffic intended for the legitimate website to a different website under their control. This allowed the attacker to eavesdrop on the user while they were shopping online and potentially steal their credit card information. An on-path attack is an attack in which the attacker has control over a network along the path between the sender and the receiver. Protocol poisoning is a type of attack in which an attacker modifies a protocol message in an attempt to disrupt or subvert normal communication. Bluejacking is a type of attack in which an attacker sends unsolicited messages to Bluetooth-enabled devices. None of these attacks are directly related to the scenario described in the question.
upvoted 6 times
BD69
1 year, 4 months ago
"Domain hijacking refers to the unauthorized acquisition of control over a domain name", so the answer can't be C: There was no unauthorized acquisition of control over a domain name in this case, just a redirection for this victim. If it was domain hijacking, then ALL visitors to said domain would be affected.
upvoted 1 times
...
...
rodwave
2 years, 7 months ago
Selected Answer: A
Answer: On-path attack An On-path attack(Man in the Middle) occurs when an attacker place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two. In this question, the attacker was eavesdropping on the connection which means they placed themselves between the user and the shopping site and intercepted the communication. The attacker had likely captured credit card information or account information from the site to be able to make the purchases.
upvoted 3 times
Bogardinc
2 years, 5 months ago
Are you guys forgetting in the question it states "The attacker was able to spoof the IP address associated with the shopping site"
upvoted 2 times
princajen
2 years, 3 months ago
No, spoofing an IP address and hijacking a domain are two different types of attacks. In a domain hijacking attack, the attacker gains control of a domain name and redirects users to a different site that appears to be the legitimate one. In the scenario you described, the attacker spoofed the IP address of the shopping site, which means they sent packets to the user's computer with a false source IP address, making it appear as if the packets were coming from the shopping site. This allowed the attacker to intercept and view the user's traffic, including their credit card information, without the user's knowledge. This is an example of an on-path attack or a man-in-the-middle attack.
upvoted 5 times
...
...
...
alayeluwa
2 years, 8 months ago
Selected Answer: A
Man in the middle.
upvoted 1 times
...
ostralo
2 years, 8 months ago
Selected Answer: A
A, FYI, Domain hijacking is the act of changing the registration of a domain name without the permission of the original owner, or by abuse of privileges on domain hosting and domain registrar systems.
upvoted 1 times
...
comeragh
2 years, 9 months ago
Selected Answer: A
"Eavesdroppping" - On-Path
upvoted 2 times
...
KetReeb
2 years, 10 months ago
A: On-path (MTM) - attacker was eavesdropping on the communications, spoofed the IP of the shopping site that the victim thought was legit, a purchase was attempted, credit info intercepted.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...