Live Virtual Lab 8.1: Module 08 Identifying Indicators of a Network Attack
Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply] Nemesy UDP Flooder HTTP Unbearable Load King (HULK) DAVOSET
All of them
Which of the following attack is also known as DNS spoofing? A. Domain Hijacking B. DNS Hijacking C. Universal Resource Locator (URL) Redirection D. DNS poisoning
DNS poisoning
Which of the following is globally unique in the system? A. MAC address B. IP address C. Gateway D. Subnet Mask
MAC address
Which of the following can be triggered when a document opens? A. PowerShell script B. Bash script C. Python script D. Macro
Macro
Which of the following tool can be used to automate the setup of an evil twin? A. Wi-Fi Pineapple B. Wi-Fi Root C. Wi-Fi Apple D. Wi-Fi Orange
Wi-Fi Pineapple