Exam 7: Spoofing
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
In ____________________, the hacker can see both parties, observe the responses from the target computer, and respond accordingly.
Free
(Short Answer)
4.8/5
(27)
Correct Answer:
active spoofing
How can a computer be authenticated?
Free
(Essay)
4.8/5
(29)
Correct Answer:
A computer can be authenticated by its IP address, IP host address, or MAC address.
IP address-An IPv4 address is a set of dotted numeric figures such as 66.37.227.194 (this particular address is in the Cox Communications Omaha NE network).
IP host address-This is the "friendly URL" for a machine, e.g., mail.yahoo.com.
MAC address-MAC stands for Media Access Control and is a 12-character hexadecimal number that every network appliance or PC has.MAC addresses are usually notated like this: 00-09-D5-00-DB-BA. Each MAC address contains the code for the manufacturer. You can look up MAC addresses on the Internet at www.techzoom.net/nettools-macdecode.asp.
When a hacker spoofs an IP address through a Web site, it is known as ____ spoofing.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
Identifying a trust relationship from your network to an outside machine is a passive activity.
(True/False)
4.9/5
(44)
____ can be define as misrepresenting the sender of a message (e-mail, IM, letter, resume, etc.) in a way that causes the human recipient to behave a certain way.
(Multiple Choice)
4.9/5
(31)
At the heart of internetworked systems are two critical issues: trust and ____________________.
(Short Answer)
4.8/5
(33)
Briefly describe the main characteristics of economic loss as a result of a spoofing attack.
(Essay)
4.9/5
(40)
The costs to the victims of successful spoofing attacks are tied to the amount of information that was copied and the sensitivity of the data.
(True/False)
4.9/5
(25)
A(n) ____ stores the IP address and the corresponding Media Access Control (MAC) address of the computer that would be notified to send data.
(Multiple Choice)
4.8/5
(34)
____ takes care of the transport between machines. But it is unreliable, and there is no guarantee that any given packet will arrive unscathed.
(Multiple Choice)
4.7/5
(40)
____________________ can be defined as a sophisticated way to authenticate one machine to another by using forged packets.
(Short Answer)
4.8/5
(46)
A successful IP spoofing attack requires more than simply forging a single header. On the contrary, there must be a complete, sustained dialogue between the machines for a minimum of five packets.
(True/False)
4.9/5
(38)
____________________ is any kind of spoofing where only one side of the relationship under attack is in view.
(Short Answer)
4.9/5
(38)
TCP/IP has a basic flaw that allows IP spoofing. This is due to the fact that trust and authentication have an linear relationship.
(True/False)
5.0/5
(42)
Arpspoof, part of the Ettercap suite, can be used to spoof ARP tables.
(True/False)
4.8/5
(32)
____ loss is a loss of, or the untimely publication of, strategic data that outlines events planned for the future.
(Multiple Choice)
4.8/5
(35)
Modifying the Address Resolution Protocol (ARP) table for hacking purposes is called ____________________.
(Short Answer)
4.9/5
(34)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)