Deck 7: Spoofing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 7: Spoofing
1
TCP/IP has a basic flaw that allows IP spoofing. This is due to the fact that trust and authentication have an linear relationship.
False
2
A successful IP spoofing attack requires more than simply forging a single header. On the contrary, there must be a complete, sustained dialogue between the machines for a minimum of five packets.
False
3
Identifying a trust relationship from your network to an outside machine is a passive activity.
True
4
The costs to the victims of successful spoofing attacks are tied to the amount of information that was copied and the sensitivity of the data.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Arpspoof, part of the Ettercap suite, can be used to spoof ARP tables.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____ can be define as misrepresenting the sender of a message (e-mail, IM, letter, resume, etc.) in a way that causes the human recipient to behave a certain way.
A)Hijacking
B)Skipjacking
C)Spoofing
D)Poisoning
A)Hijacking
B)Skipjacking
C)Spoofing
D)Poisoning
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
____ takes care of the transport between machines. But it is unreliable, and there is no guarantee that any given packet will arrive unscathed.
A)TCP
B)IP
C)ARP
D)RIP
A)TCP
B)IP
C)ARP
D)RIP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ loss is a loss of, or the untimely publication of, strategic data that outlines events planned for the future.
A)Strategic
B)Economic
C)General data
D)Position
A)Strategic
B)Economic
C)General data
D)Position
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
A(n) ____ stores the IP address and the corresponding Media Access Control (MAC) address of the computer that would be notified to send data.
A)IP table
B)TCP table
C)MAC table
D)ARP table
A)IP table
B)TCP table
C)MAC table
D)ARP table
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
When a hacker spoofs an IP address through a Web site, it is known as ____ spoofing.
A)ARP
B)Web
C)IP
D)active
A)ARP
B)Web
C)IP
D)active
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ can be defined as a sophisticated way to authenticate one machine to another by using forged packets.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
At the heart of internetworked systems are two critical issues: trust and ____________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ is any kind of spoofing where only one side of the relationship under attack is in view.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
In ____________________, the hacker can see both parties, observe the responses from the target computer, and respond accordingly.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Modifying the Address Resolution Protocol (ARP) table for hacking purposes is called ____________________.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
How can a computer be authenticated?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
What are the steps to spoof a trusted machine relationship?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Briefly describe the main characteristics of economic loss as a result of a spoofing attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck