IS4560 CH 13 Linux, Live CDs, & Automated Assessment Tools Flashcards

1
Q
  1. A DoS is meant to deny a service from legitimate usage.

A. True B. False

A
  1. A 2. B 3. A 4. A 5. B 6. B 7. A 8. A 9. B 10. A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. Sniffers can be used to:
A. Decrypt information 
B. Capture information 
C. Hijack communications
D. Security enforcement
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Session hijacking is used to capture traffic.
    A. True
    B. False
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Session hijacking is used to take over an authenticated session
    A. True B. False
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Active sniffing is used when switches are present.

A. True B. False

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. ________ is used to overwhelm a service.
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. ________ is used to flood a switch with

bogus MAC addresses.

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. \_\_\_\_\_\_\_\_ is used to fake a MAC address.
A. Spoofing 
B. Flooding 
C. Poisoning 
D. Hijacking
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. What type of device can have its memory filled up when MAC flooding is used?
A. Hub 
B. Switch 
C. Router 
D. Gateway
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. What technique is used when traffic is captured on a network with hubs?
A. Active sniffing 
B. Passive sniffing 
C. MAC Flooding 
D. Ether flooding
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly