Cisco Secure Intrusion Detection System (CSIDS)
Which of the following types of attacks is typical of an intruder who is targeting networks of
systems in an effort to retrieve data of enhance their privileges?
A. Access attack
B. Denial of Service attack
C. Man in the middle attack
D. Authorization attack
E. Reconnaissance attack
Access is a broad term used to describe any attack that requires the intruder to gain unauthorized
access to a secure system with the intent to manipulate data, elevate privileges, or simply access
the system. The term "access attack" is used to describe any attempt to gain system access,
perform data manipulation, or elevate privileges. System Access Attacks System access is the act
of gaining unauthorized access to a system for which the attacker doesn't have a user account.
Hackers usually gain access to a device by running a script or a hacking tool, or exploiting a
known vulnerability of an application or service running on the host.
Data Manipulation Access Attacks
Data manipulation occurs when an intruder simply reads, copies, writes, deletes, or changes data
that isn't intended to be accessible by the intruder. This could be as simple as finding a share on a
Windows 9x or NT computer, or as difficult as attempting to gain access to a credit bureau's
information, or breaking into the department of motor vehicles to change a driving record.
Elevating Privileges Access Attacks Elevating privileges is a common type of attack. By elevating
privileges an intruder can gain access to files, folders or application data that the user account was
not initially granted access to. Once the hacker has gained a high-enough level of access, they can
install applications, such as backdoors and Trojan horses, to allow further access and
reconnaissance. A common goal of hackers is to CCSP: Cisco Certified Security Professional
Certification All-in-One Exam Guide Cisco Coursewa