IS4560 CH 12 Sniffers, Session Hacking, & Denial of Service Attacks Flashcards
1
Q
- A DoS is meant to deny a service from legitimate usage.
A. True B. False
A
True
2
Q
2. Sniffers can be used to: A. Decrypt information B. Capture information C. Hijack communications D. Security enforcement
A
Capture information
3
Q
- Session hijacking is used to capture traffic.
A. True
B. False
A
False
4
Q
- Session hijacking is used to take over an authenticated session
A. True B. False
A
True
5
Q
- Active sniffing is used when switches are present.
A. True B. False
A
True
6
Q
- ________ is used to overwhelm a service.
A
Hijacking
7
Q
- ________ is used to flood a switch with bogus MAC addresses.
A
MAC flooding
8
Q
8. \_\_\_\_\_\_\_\_ is used to fake a MAC address. A. Spoofing B. Flooding C. Poisoning D. Hijacking
A
Spoofing
9
Q
9. What type of device can have its memory filled up when MAC flooding is used? A. Hub B. Switch C. Router D. Gateway
A
Switch
10
Q
10. What technique is used when traffic is captured on a network with hubs? A. Active sniffing B. Passive sniffing C. MAC Flooding D. Ether flooding
A
Passive sniffing