Post Assessment 3
What is a SPAN port on a switch?
A port configured to receive a copy of every packet
What kind of attack are you experiencing when the reduces, restricts, or prevents users from accessing the system?
DoS attack
Which of the following is not an active sniffing technique?
FIN scan
What is the recommended security protocol used to secure IP communication by authenticating and encrypting?
IPSec
Which of the following describes spimming?
It exploits instant messaging.
What information below does a CAM table not store?
TTL
Which of the following is not a session hijacking tool?
Wireshark
Which of the following sniffing tools is the most commonly used tool?
Wireshark
A denial of service attack can target bandwidth, connection state tables and what other basic category?
application layer attack
A MITM attack splits the TSP connection to two connections: client-to-attacker and ___________.
attacker-to-server
A huge network of compromised computers under the control of an attacker used to launch denial-of-service attacks is called _____________.
botnet
Cross-site request forgery is a _____-side attack.
client
What is it called when someone steals your PII for fraudulent use?
identity theft
A(n) ______________ is an employee with access to critical assets.
insider
Session hijacking can occur at the application and _____ layers of the OSI model.
network
What mode does a NIC of a system need to be in so network sniffing can occur?
promiscuous
Which phase of social engineering comes before develop relationship?
select victim
When an attacker spoofs the source IP address with the victim's IP address and sends large numbers of ICMP ECHO requests, this is called a(n) __________ attack.
smurf attack
What type of engineering makes people reveal sensitive information?
social engineering
Which of the following techniques would not be deployed to mitigate a denial-of-service attack?
turn off system