IS4560 CH 12 Sniffers, Session Hacking, & Denial of Service Attacks Flashcards

1
Q
  1. A DoS is meant to deny a service from legitimate usage.

A. True B. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Sniffers can be used to:
A. Decrypt information 
B. Capture information 
C. Hijack communications 
D. Security enforcement
A

Capture information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Session hijacking is used to capture traffic.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Session hijacking is used to take over an authenticated session
    A. True B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Active sniffing is used when switches are present.

A. True B. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. ________ is used to overwhelm a service.
A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. ________ is used to flood a switch with bogus MAC addresses.
A

MAC flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. \_\_\_\_\_\_\_\_ is used to fake a MAC address.
A. Spoofing 
B. Flooding 
C. Poisoning 
D. Hijacking
A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. What type of device can have its memory filled up when MAC flooding is used?
A. Hub 
B. Switch 
C. Router 
D. Gateway
A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. What technique is used when traffic is captured on a network with hubs?
A. Active sniffing 
B. Passive sniffing 
C. MAC Flooding 
D. Ether flooding
A

Passive sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly