Exam 7: Spoofing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In ____________________, the hacker can see both parties, observe the responses from the target computer, and respond accordingly.

Free
(Short Answer)
4.8/5
(27)
Correct Answer:
Verified

active spoofing

How can a computer be authenticated?

Free
(Essay)
4.8/5
(29)
Correct Answer:
Verified

A computer can be authenticated by its IP address, IP host address, or MAC address.
IP address-An IPv4 address is a set of dotted numeric figures such as 66.37.227.194 (this particular address is in the Cox Communications Omaha NE network).
IP host address-This is the "friendly URL" for a machine, e.g., mail.yahoo.com.
MAC address-MAC stands for Media Access Control and is a 12-character hexadecimal number that every network appliance or PC has.MAC addresses are usually notated like this: 00-09-D5-00-DB-BA. Each MAC address contains the code for the manufacturer. You can look up MAC addresses on the Internet at www.techzoom.net/nettools-macdecode.asp.

When a hacker spoofs an IP address through a Web site, it is known as ____ spoofing.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

Identifying a trust relationship from your network to an outside machine is a passive activity.

(True/False)
4.9/5
(44)

____ can be define as misrepresenting the sender of a message (e-mail, IM, letter, resume, etc.) in a way that causes the human recipient to behave a certain way.

(Multiple Choice)
4.9/5
(31)

At the heart of internetworked systems are two critical issues: trust and ____________________.

(Short Answer)
4.8/5
(33)

Briefly describe the main characteristics of economic loss as a result of a spoofing attack.

(Essay)
4.9/5
(40)

The costs to the victims of successful spoofing attacks are tied to the amount of information that was copied and the sensitivity of the data.

(True/False)
4.9/5
(25)

What are the steps to spoof a trusted machine relationship?

(Essay)
4.8/5
(33)

A(n) ____ stores the IP address and the corresponding Media Access Control (MAC) address of the computer that would be notified to send data.

(Multiple Choice)
4.8/5
(34)

____ takes care of the transport between machines. But it is unreliable, and there is no guarantee that any given packet will arrive unscathed.

(Multiple Choice)
4.7/5
(40)

____________________ can be defined as a sophisticated way to authenticate one machine to another by using forged packets.

(Short Answer)
4.8/5
(46)

A successful IP spoofing attack requires more than simply forging a single header. On the contrary, there must be a complete, sustained dialogue between the machines for a minimum of five packets.

(True/False)
4.9/5
(38)

____________________ is any kind of spoofing where only one side of the relationship under attack is in view.

(Short Answer)
4.9/5
(38)

TCP/IP has a basic flaw that allows IP spoofing. This is due to the fact that trust and authentication have an linear relationship.

(True/False)
5.0/5
(42)

Arpspoof, part of the Ettercap suite, can be used to spoof ARP tables.

(True/False)
4.8/5
(32)

____ loss is a loss of, or the untimely publication of, strategic data that outlines events planned for the future.

(Multiple Choice)
4.8/5
(35)

Modifying the Address Resolution Protocol (ARP) table for hacking purposes is called ____________________.

(Short Answer)
4.9/5
(34)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)