PrepAway - Latest Free Exam Questions & Answers

Author: admin

The spoofed IP address used by the attacker as the sour…

What sort of attack is described by the following: An attacker has a list of broadcast addresses which it stores
into an array, the attacker sends a spoofed icmp echo request to each of those addresses in series and starts
again. The spoofed IP address used by the attacker as the source of the packets is the target/victim IP
address.

What protocol was used here to conduct the file transfer?

You are using an open source packet analyzer called Wireshark and are sifting through the various
conversations to see if anything appears to be out of order.
You are observing a UDP conversation between a host and a router. It was a file transfer between the two on
port 69. What protocol was used here to conduct the file transfer?


Page 102 of 277« First...102030...100101102103104...110120130...Last »