Deck 7: Administering a Secure Network

ملء الشاشة (f)
exit full mode
سؤال
A ____ forwards packets across computer networks.

A) bridge
B) router
C) switch
D) hub
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.

A) UDP
B) ASN.1
C) TCP/IP
D) BER
سؤال
____ can be used to determine whether new IP addresses are attempting to probe the network.

A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
سؤال
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

A) entity
B) community string
C) MIB
D) OID
سؤال
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.

A) VLAN
B) subnets
C) IP address
D) MAC address
سؤال
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
سؤال
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
سؤال
A ____ can create entries in a log for all queries that are received.

A) network log
B) DHCP log
C) DNS log
D) proxy log
سؤال
IEEE 802.1x is commonly used on wireless networks.
سؤال
IP telephony and Voice over IP (VoIP) are identical.
سؤال
____ is used to relay query messages.

A) ICMP
B) FTP
C) UDP
D) TCP
سؤال
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
سؤال
Routers operate at the ____ Layer.

A) Transport
B) Application
C) Presentation
D) Network
سؤال
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
سؤال
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.

A) WINS
B) NIS
C) TACACS+
D) DNS
سؤال
Broadcast storms can be prevented with ____.

A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
سؤال
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.

A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
سؤال
TCP port ____ is the FTP control port used for passing FTP commands.

A) 19
B) 20
C) 21
D) 22
سؤال
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.

A) flood guard
B) protocol guard
C) link guard
D) frame guard
سؤال
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

A) BIND
B) DHCP
C) WINS
D) finger
سؤال
In the ____ cloud computing model, the customer has the highest level of control.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
سؤال
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.

A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
سؤال
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

A) kernel
B) supervisor
C) hypercard
D) hypervisor
سؤال
List and describe the three fields that each ICMP message contains.
سؤال
Describe one way to use FTP on a local host computer.
سؤال
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
سؤال
Why is the Physical Layer omitted in the TCP/IP model?
سؤال
Discuss one security advantage to hosts running virtualization.
سؤال
What are the two types of community strings?
سؤال
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

A) Portability
B) Virtualization
C) Availability
D) Migration assistance
سؤال
____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
سؤال
The ____________________ Layer is omitted in the TCP/IP model.
سؤال
List the steps of a DNS lookup.
سؤال
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
سؤال
____________________ servers are intermediate hosts through which Web sites are accessed.
سؤال
List the steps in an 802.1x authentication procedure.
سؤال
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
سؤال
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
سؤال
A(n) ____________________ is a record of events that occur.
سؤال
List and describe the three service models of cloud computing.
سؤال
List and describe three benefits offered by IP telephony.
سؤال
Match between columns
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
ICMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Network discovery
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Ping of Death
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
SNMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS poisoning
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
STA
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
IP telephony
Functions by exchanging management information between networked devices
DNS
Functions by exchanging management information between networked devices
ICMP
Functions by exchanging management information between networked devices
Network discovery
Functions by exchanging management information between networked devices
Smurf DoS attack
Functions by exchanging management information between networked devices
Ping of Death
Functions by exchanging management information between networked devices
SNMP
Functions by exchanging management information between networked devices
DNS poisoning
Functions by exchanging management information between networked devices
STA
Functions by exchanging management information between networked devices
IP telephony
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
ICMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Network discovery
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Smurf DoS attack
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
SNMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS poisoning
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
STA
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
IP telephony
Substitutes addresses so that the computer is automatically redirected to another device
DNS
Substitutes addresses so that the computer is automatically redirected to another device
ICMP
Substitutes addresses so that the computer is automatically redirected to another device
Network discovery
Substitutes addresses so that the computer is automatically redirected to another device
Smurf DoS attack
Substitutes addresses so that the computer is automatically redirected to another device
Ping of Death
Substitutes addresses so that the computer is automatically redirected to another device
SNMP
Substitutes addresses so that the computer is automatically redirected to another device
DNS poisoning
Substitutes addresses so that the computer is automatically redirected to another device
STA
Substitutes addresses so that the computer is automatically redirected to another device
IP telephony
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
ICMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Network discovery
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Smurf DoS attack
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Ping of Death
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
SNMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS poisoning
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
STA
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
IP telephony
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
ICMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Network discovery
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Smurf DoS attack
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Ping of Death
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
SNMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS poisoning
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
STA
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
IP telephony
Used by devices to communicate updates or error information to other devices
DNS
Used by devices to communicate updates or error information to other devices
ICMP
Used by devices to communicate updates or error information to other devices
Network discovery
Used by devices to communicate updates or error information to other devices
Smurf DoS attack
Used by devices to communicate updates or error information to other devices
Ping of Death
Used by devices to communicate updates or error information to other devices
SNMP
Used by devices to communicate updates or error information to other devices
DNS poisoning
Used by devices to communicate updates or error information to other devices
STA
Used by devices to communicate updates or error information to other devices
IP telephony
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
ICMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Network discovery
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Smurf DoS attack
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Ping of Death
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
SNMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS poisoning
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
STA
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
IP telephony
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Administering a Secure Network
1
A ____ forwards packets across computer networks.

A) bridge
B) router
C) switch
D) hub
B
2
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.

A) UDP
B) ASN.1
C) TCP/IP
D) BER
C
3
____ can be used to determine whether new IP addresses are attempting to probe the network.

A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
B
4
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

A) entity
B) community string
C) MIB
D) OID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.

A) VLAN
B) subnets
C) IP address
D) MAC address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A ____ can create entries in a log for all queries that are received.

A) network log
B) DHCP log
C) DNS log
D) proxy log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
IEEE 802.1x is commonly used on wireless networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
IP telephony and Voice over IP (VoIP) are identical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ is used to relay query messages.

A) ICMP
B) FTP
C) UDP
D) TCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Routers operate at the ____ Layer.

A) Transport
B) Application
C) Presentation
D) Network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.

A) WINS
B) NIS
C) TACACS+
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Broadcast storms can be prevented with ____.

A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.

A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
TCP port ____ is the FTP control port used for passing FTP commands.

A) 19
B) 20
C) 21
D) 22
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.

A) flood guard
B) protocol guard
C) link guard
D) frame guard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

A) BIND
B) DHCP
C) WINS
D) finger
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
In the ____ cloud computing model, the customer has the highest level of control.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.

A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

A) kernel
B) supervisor
C) hypercard
D) hypervisor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
List and describe the three fields that each ICMP message contains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe one way to use FTP on a local host computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.

A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Why is the Physical Layer omitted in the TCP/IP model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Discuss one security advantage to hosts running virtualization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are the two types of community strings?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

A) Portability
B) Virtualization
C) Availability
D) Migration assistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ provides a greater degree of security by implementing port-based authentication.

A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The ____________________ Layer is omitted in the TCP/IP model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
List the steps of a DNS lookup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____________________ servers are intermediate hosts through which Web sites are accessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
List the steps in an 802.1x authentication procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n) ____________________ is a record of events that occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
List and describe the three service models of cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
List and describe three benefits offered by IP telephony.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
ICMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Network discovery
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Smurf DoS attack
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Ping of Death
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
SNMP
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
DNS poisoning
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
STA
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
IP telephony
Functions by exchanging management information between networked devices
DNS
Functions by exchanging management information between networked devices
ICMP
Functions by exchanging management information between networked devices
Network discovery
Functions by exchanging management information between networked devices
Smurf DoS attack
Functions by exchanging management information between networked devices
Ping of Death
Functions by exchanging management information between networked devices
SNMP
Functions by exchanging management information between networked devices
DNS poisoning
Functions by exchanging management information between networked devices
STA
Functions by exchanging management information between networked devices
IP telephony
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
ICMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Network discovery
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Smurf DoS attack
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Ping of Death
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
SNMP
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
DNS poisoning
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
STA
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
IP telephony
Substitutes addresses so that the computer is automatically redirected to another device
DNS
Substitutes addresses so that the computer is automatically redirected to another device
ICMP
Substitutes addresses so that the computer is automatically redirected to another device
Network discovery
Substitutes addresses so that the computer is automatically redirected to another device
Smurf DoS attack
Substitutes addresses so that the computer is automatically redirected to another device
Ping of Death
Substitutes addresses so that the computer is automatically redirected to another device
SNMP
Substitutes addresses so that the computer is automatically redirected to another device
DNS poisoning
Substitutes addresses so that the computer is automatically redirected to another device
STA
Substitutes addresses so that the computer is automatically redirected to another device
IP telephony
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
ICMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Network discovery
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Smurf DoS attack
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Ping of Death
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
SNMP
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
DNS poisoning
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
STA
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
IP telephony
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
ICMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Network discovery
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Smurf DoS attack
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Ping of Death
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
SNMP
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
DNS poisoning
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
STA
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
IP telephony
Used by devices to communicate updates or error information to other devices
DNS
Used by devices to communicate updates or error information to other devices
ICMP
Used by devices to communicate updates or error information to other devices
Network discovery
Used by devices to communicate updates or error information to other devices
Smurf DoS attack
Used by devices to communicate updates or error information to other devices
Ping of Death
Used by devices to communicate updates or error information to other devices
SNMP
Used by devices to communicate updates or error information to other devices
DNS poisoning
Used by devices to communicate updates or error information to other devices
STA
Used by devices to communicate updates or error information to other devices
IP telephony
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
ICMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Network discovery
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Smurf DoS attack
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Ping of Death
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
SNMP
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
DNS poisoning
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
STA
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
IP telephony
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.