Matching
Match each term with the correct statement below.
Premises:
A malformed ping using ICMP is sent to the victim's computer that exceeds the size of an IP packet
Functions by exchanging management information between networked devices
An attacker can use ICMP messages as one of the first steps in reconnaissance to discover information about the hosts that are part of the network
Substitutes addresses so that the computer is automatically redirected to another device
Attackers can broadcast a ping request to all computers on the network but change the address from which the request came to that of the target
Using a data-based OP network to add digital voice clients and new voice applications onto the IP network
Used by devices to communicate updates or error information to other devices
Can determine that a switch has multiple ways to communicate with a host and then determine the best path while blocking out other paths
Responses:
Smurf DoS attack
DNS
Ping of Death
ICMP
Network discovery
STA
SNMP
DNS poisoning
IP telephony
Correct Answer:
Premises:
Responses:
Smurf DoS attack
DNS
Ping of Death
ICMP
Network discovery
STA
SNMP
DNS poisoning
IP telephony
Premises:
Smurf DoS attack
DNS
Ping of Death
ICMP
Network discovery
STA
SNMP
DNS poisoning
IP telephony
Responses:
Related Questions
Q7: The _ is a database, organized as
Q10: Server virtualization typically relies on the _,
Q11: Broadcast storms can be prevented with _.<br>A)
Q13: DNS poisoning can be prevented by using
Q15: _ is a pay-per-use computing model in
Q16: TCP port _ is the FTP control
Q17: A _ can create entries in a
Q19: List the steps of a DNS lookup.
Q45: IEEE 802.1x is commonly used on wireless
Q50: Discuss the problems associated with storing the