Live Virtual Machine Lab 8.1: Module 08 Identifying Indicators of a Network Attack
अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!
Which of the following attack is also known as DNS spoofing?
DNS poisoning
Which of the following is globally unique in the system?
MAC address
Which of the following can be triggered when a document opens?
Macro
Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply]
UDP Flooder Nemesy DAVOSET HTTP Unbearable Load King (HULK)
Which of the following tool can be used to automate the setup of an evil twin?
Wi-Fi Pineapple