ITN261 ch11

¡Supera tus tareas y exámenes ahora con Quizwiz!

switch.

A device used to break a network intological network segments known as collision domains is called a:

botnet.

A group of infected systems that are used to collectively attack another system is called a:

passive session hijacking

Botnets are used to perform all of the following attacks EXCEPT

scale.

The primary difference between denial of service (DoS) attacks and distributed denial of service (DDoS) attacks is:

Active session hijacking

In what type of attack does the attacker take over an established session between two parties and then interact with the remaining party as if the attacker were the party that has been disconnected?

methods of bypassing a switch to perform sniffing.

Media Access Control (MAC) flooding and Address Resolution Protocol (ARP) poisoning are

employing operating systems that create predictable sets of sequence numbers.

All of the following actions can be helpful in thwarting session hijacking attacks EXCEPT:

Smurf.

All of the following are commonly used tools to perform session hijacking EXCEPT:

sniffer

An application or device that is designed to capture network traffic as it moves across the network itself is referred to as a

denial of service (DoS) attacks

Consumption of bandwidth, consumption of resources, and exploitation of programming defects are the three broad categories of:

Media Access Control (MAC) flooding

Countermeasures that can be used to defeat sniffing include all of the following EXCEPT:

Passive sniffing

What type of sniffing takes place on networks such as those that have a hub as the connectivity device?

Active sniffing

What type of sniffing takes place on networks that have connectivity hardware that is "smarter" or more advanced, such as those with a switch?

Inject packets into the network prior to the authentication process.

Which of the following is NOT one of the steps an attacker must perform to conduct a successful session hijacking?

Distributed denial of service (DDoS) attacks

Which of the following refers to using many systems to attack another system?

It cannot be used to alter data in transmission or tap Voice over IP (VoIP) phone calls.

Which of the following statements is NOT true regarding Address Resolution Protocol (ARP) poisoning?

The attack is easily tracked back to its true source.

Which of the following statements is NOT true regarding distributed denial of service (DDoS) attacks?

In passive session hijacking, the attacker assumes the role of the party he has displaced

Which of the following statements is NOT true regarding passive session hijacking?

Passive sniffing works only when the traffic you wish to observe and the station that will do the sniffing are in different collision domains

Which of the following statements is NOT true regarding passive sniffing?

collision domain

With a hub connectivity device in place,all traffic can be seen by all other stations, which can be also referred to as all stations being on the same:


Conjuntos de estudio relacionados

Erikson's Stages with cross references from lecture/lab and NCLEX style practice questions at the end

View Set

Law Exam 1 quiz/ homework questions

View Set

Homework 8 - Chromosome Rearrangements

View Set

OOP Chapter (1, 2, 3) Multiple Choice Questions

View Set