IS4560 CH 13 Linux, Live CDs, & Automated Assessment Tools Flashcards
1
Q
- A DoS is meant to deny a service from legitimate usage.
A. True B. False
A
- A 2. B 3. A 4. A 5. B 6. B 7. A 8. A 9. B 10. A
2
Q
2. Sniffers can be used to: A. Decrypt information B. Capture information C. Hijack communications D. Security enforcement
A
.
3
Q
- Session hijacking is used to capture traffic.
A. True
B. False
A
.
4
Q
- Session hijacking is used to take over an authenticated session
A. True B. False
A
.
5
Q
- Active sniffing is used when switches are present.
A. True B. False
A
.
6
Q
- ________ is used to overwhelm a service.
A
.
7
Q
- ________ is used to flood a switch with
bogus MAC addresses.
A
.
8
Q
8. \_\_\_\_\_\_\_\_ is used to fake a MAC address. A. Spoofing B. Flooding C. Poisoning D. Hijacking
A
.
9
Q
9. What type of device can have its memory filled up when MAC flooding is used? A. Hub B. Switch C. Router D. Gateway
A
.
10
Q
10. What technique is used when traffic is captured on a network with hubs? A. Active sniffing B. Passive sniffing C. MAC Flooding D. Ether flooding
A
.