Exam 2: Types of Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Trin00 can run as a ___________,a program that usually has no visual interface and provides some background service.

(Short Answer)
4.8/5
(35)

How does the SYN cookie work?

(Multiple Choice)
4.8/5
(35)

Trojan horses often gain access to users machines by appearing as a funny or useful file sent as an e-mail ____________.

(Short Answer)
4.9/5
(34)

Which router configuration is potentially least vulnerable to an attack?

(Multiple Choice)
4.7/5
(40)

Which attack occurs by sending packets that are too large for the target machine to handle?

(Multiple Choice)
4.7/5
(25)

Which attack relies on broadcast packets to cause a network to actually flood itself with ICMP packets?

(Multiple Choice)
4.8/5
(34)

The ____________ is probably the most used and most widely known DoS tool.

(Short Answer)
4.7/5
(43)
Showing 21 - 27 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)