ANY ANSWER IS APPRECIATED
TFTP |
||
POP3 |
||
NNTP |
||
IRC |
||
SMTP |
1 points
QUESTION 2
Which of the following best describes a data packet?
A numbered designation of a particulat connection point or communication pathway |
||
Group of bytes to be sent between two devices on a network |
||
A set of rules used to communicate information |
||
A binary equivalent to a street address |
1 points
QUESTION 3
Choose the network component that connects other devices to a network
Router |
||
Switch |
||
Pub |
||
DataCom |
1 points
QUESTION 4
The chief characteristic of a Smurf attack is that an attacker
Uses a "cannon" to send an extremely large packet to overwhelm a target device |
||
Requests that a huge amount of devices send ICMP responses to a target IP address |
||
Requests a huge number of connections that they have no intention of completing, effectively overhelming the target's resources |
||
Uses the Smurf virus to cause a buffer overflow in the network software of a target |
1 points
QUESTION 5
The Internet was designed to scale to nearly unlimited connected devices - How does this relate to common network attacks?
It doesn't - Any one network device can only receive traffic from one other device at a time |
||
Having so many devices on the Internet makes it tougher to target any single specific device |
||
Many network attacks rely on tricking a large number of devices to target and overwhelm a single device or network |
||
As the Internet grows larger, it makes it more difficult for an attacker to scan all of the available IP addresses - This causes a reduction in the number of attacks they can launch |
1 points
QUESTION 6
Choose the network component that is used to connect two or more networks
Router |
||
Switch |
||
Hub |
||
DataCom |
1 points
QUESTION 7
What drawback of older protocols like Ethernet or IPv4 allow attackers to "spoof" or forge packets with the source address of another device?
Ethernet and IPv4 allow for using up to 5 source addresses |
||
Ethernet and IPv4 allow packets to be created with any source address, with no verification |
||
Ethernet and IPv4 don't enforce maximum packet sizes, making it possible to include additional source addresses in a data packet |
||
Ethernet and IPv4 do authenticate source addresses, but attackers have cracked the process because it is old |
1 points
QUESTION 8
True or False - Because the predecessor of the Internet was developed for the Department of Defense, advanced security measures were built into the main protocols used on the Internet
True
False
1 points
QUESTION 9
Protocols like Ethernet and IPv4 do not protect the confidentiality of the data they carry - This makes them susceptible to
Cracking |
||
Hashing |
||
Flooding |
||
Eavesdropping |
1 points
QUESTION 10
The chief characteristic of a SYN flood attack is that an attacker
Uses a "cannon" to send an extremely large packet to overwhelm a target device |
||
Requests that a huge amount of devices send ICMP responses to a target IP address |
||
Requests a huge number of connections that they have no intention of completing, effectively overhelming the target's resources |
||
Uses the Smurf virus to cause a buffer overflow in the network software of a target |
Please find the answers as the following
(1) POP3,SMTP
(2) Group of bytes to be sent between two devices on a network
(3) Switch
(4) Requests that a huge amount of devices send ICMP responses to a target IP address
(5) Many network attacks rely on tricking a large number of devices to target and overwhelm a single device or network
(6) Router
(7) Ethernet and IPv4 allow packets to be created with any source address, with no verification
(8) False
(9) Flooding
(10) Requests a huge number of connections that they have no intention of completing, effectively overwhelming the target's resources
Get Answers For Free
Most questions answered within 1 hours.