ITN261 ch11
switch.
A device used to break a network intological network segments known as collision domains is called a:
botnet.
A group of infected systems that are used to collectively attack another system is called a:
passive session hijacking
Botnets are used to perform all of the following attacks EXCEPT
scale.
The primary difference between denial of service (DoS) attacks and distributed denial of service (DDoS) attacks is:
Active session hijacking
In what type of attack does the attacker take over an established session between two parties and then interact with the remaining party as if the attacker were the party that has been disconnected?
methods of bypassing a switch to perform sniffing.
Media Access Control (MAC) flooding and Address Resolution Protocol (ARP) poisoning are
employing operating systems that create predictable sets of sequence numbers.
All of the following actions can be helpful in thwarting session hijacking attacks EXCEPT:
Smurf.
All of the following are commonly used tools to perform session hijacking EXCEPT:
sniffer
An application or device that is designed to capture network traffic as it moves across the network itself is referred to as a
denial of service (DoS) attacks
Consumption of bandwidth, consumption of resources, and exploitation of programming defects are the three broad categories of:
Media Access Control (MAC) flooding
Countermeasures that can be used to defeat sniffing include all of the following EXCEPT:
Passive sniffing
What type of sniffing takes place on networks such as those that have a hub as the connectivity device?
Active sniffing
What type of sniffing takes place on networks that have connectivity hardware that is "smarter" or more advanced, such as those with a switch?
Inject packets into the network prior to the authentication process.
Which of the following is NOT one of the steps an attacker must perform to conduct a successful session hijacking?
Distributed denial of service (DDoS) attacks
Which of the following refers to using many systems to attack another system?
It cannot be used to alter data in transmission or tap Voice over IP (VoIP) phone calls.
Which of the following statements is NOT true regarding Address Resolution Protocol (ARP) poisoning?
The attack is easily tracked back to its true source.
Which of the following statements is NOT true regarding distributed denial of service (DDoS) attacks?
In passive session hijacking, the attacker assumes the role of the party he has displaced
Which of the following statements is NOT true regarding passive session hijacking?
Passive sniffing works only when the traffic you wish to observe and the station that will do the sniffing are in different collision domains
Which of the following statements is NOT true regarding passive sniffing?
collision domain
With a hub connectivity device in place,all traffic can be seen by all other stations, which can be also referred to as all stations being on the same: