Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
TCP/IP IPv6 and IPv4
Quiz 12: Securing Tcp/Ip Environments
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -the process of examining the "footprints" that an attacker leaves behind
Question 22
Short Answer
In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input.
Question 23
Multiple Choice
Which type of attacks are designed to interrupt or completely disrupt operations of a network device or network communications?
Question 24
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a manager system in a DDoS attack
Question 25
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -any activity that represents a potential danger or attack on a system or network
Question 26
Short Answer
Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -an ICMP Echo-based operation used to locate active devices on a network
Question 27
Multiple Choice
Which of the following best defines an attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it's in transit?