Exam 9: Hacking Network Devices
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
To decide the quickest, most efficient path for a packet to reach its destination, a(n) ____________________ is maintained within a router.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
route table
The default password for Cisco routers is ____________________.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
admin/admin
The user interacting via the proxy server is hidden, but can be traced through the log stored on the proxy server.
Free
(True/False)
4.7/5
(39)
Correct Answer:
True
Networking devices allow the computers on a network to interact with each other.
(True/False)
4.8/5
(31)
Why should you configure different admin passwords for all your routers and switches?
(Essay)
4.9/5
(41)
A proxy server is hard to use since it is usually not included in router or firewall software.
(True/False)
4.8/5
(33)
The attacks made through proxy servers include buffer overflow attacks, denial-of-service attacks, and ____ attacks.
(Multiple Choice)
4.9/5
(41)
____________________ works like a DoS, but the attack comes from many IP addresses, so the defense is more complicated.
(Short Answer)
4.8/5
(38)
Hackers can perform many attacks on routers and switches even if they cannot get into the building and set themselves up as a system administrator.
(True/False)
4.9/5
(40)
____ are often considered the ultimate one-point solution for securing networks from both internal and external threats.
(Multiple Choice)
4.9/5
(37)
Networking software can be divided into three categories: security software, ____ software, and transport software.
(Multiple Choice)
4.7/5
(40)
A network can be divided into two main areas: networking software and networking ____.
(Multiple Choice)
4.7/5
(28)
Routers and switches both segment a network, and all can filter packets.
(True/False)
5.0/5
(36)
The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network.
(Short Answer)
4.9/5
(36)
In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for it to determine an effective and efficient path for transfer.
(Short Answer)
4.8/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)