Live Virtual Lab 8.1: Module 08 Identifying Indicators of a Network Attack

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply] Nemesy UDP Flooder HTTP Unbearable Load King (HULK) DAVOSET

All of them

Which of the following attack is also known as DNS spoofing? A. Domain Hijacking B. DNS Hijacking C. Universal Resource Locator (URL) Redirection D. DNS poisoning

DNS poisoning

Which of the following is globally unique in the system? A. MAC address B. IP address C. Gateway D. Subnet Mask

MAC address

Which of the following can be triggered when a document opens? A. PowerShell script B. Bash script C. Python script D. Macro

Macro

Which of the following tool can be used to automate the setup of an evil twin? A. Wi-Fi Pineapple B. Wi-Fi Root C. Wi-Fi Apple D. Wi-Fi Orange

Wi-Fi Pineapple


संबंधित स्टडी सेट्स

logistics ch 5 supply chain management

View Set

IPA: American English Consonants

View Set

Chapter 34: Management of Patients With Hematologic Neoplasms

View Set

Cognitive Psychology Exam 2: Practice Questions and Key Terms/Concepts

View Set

chapter 10 quiz linux, chapter 11 quiz linux, Chapter 12 quiz linux, chapter 13 quiz linux, chapter 13 homework linux, chapter 12 homework linu, chapter 11 homework linux, chapter 10 homework Linux

View Set

ARTICLE 14 PROPERTY CONDITION DISCLOSURE IN THE SALE OF RESIDENTIAL REAL PROPERTY

View Set