Network Attacks
1) The attackers a
network of compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net
a) Internet
b) Botnet
c) Telnet
d) D-net
Answer: b
Explanation: None.
Explanation: None.
2) Which of the
following is a form of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
3) The DoS
attack is which the attacker establishes a large number of half-open or
fully open TCP connections at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: c
Explanation: None.
Explanation: None.
4)The DoS
attack is which the attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: b
Explanation: None.
Explanation: None.
5) Packet sniffers
involve
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
a) Active receiver
b) Passive receiver
c) Both of the mentioned
d) None of the mentioned
Answer: b
Explanation: They donot inject packets into the channel.
Explanation: They donot inject packets into the channel.
6) Sniffers can be
deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
7) Firewalls are often
configured to block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
Answer: a
Explanation: None.
Explanation: None.
All the best for your exams @Mission IT SO 2016
No comments:
Post a Comment