Which one of the following attacks will pass through a network layer intrusion detection system undetected?
Which one of the following attacks will pass through a network layer intrusion detection system
undetected?
Which one of the following is a passive network attack?
Which one of the following is a passive network attack?
Which one of the following can NOT typically be accomplished using a Man-in-the-middle attack?
Which one of the following can NOT typically be accomplished using a Man-in-the-middle attack?
What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet̷
What is called an attach where the attacker spoofs the source IP address in an ICMP ECHO
broadcast packet so it seems to have originated at the victim’s system, in order to flood it with
REPLY packets?
Which type of attack involves the alteration of a packet at the IP level to convince a system that it is commu
Which type of attack involves the alteration of a packet at the IP level to convince a system that it
is communicating with a known entity in order to gain access to a system?
What attack takes advantage of operating system buffer overflows?
What attack takes advantage of operating system buffer overflows?
What attack is primarily based on the fragmentation implementation of IP and large ICMP packet size?
What attack is primarily based on the fragmentation implementation of IP and large ICMP packet
size?
Land attack attacks a target by:
Land attack attacks a target by:
What attack is primarily based on the fragmentation implementation of IP?
What attack is primarily based on the fragmentation implementation of IP?
What attack floods networks with broadcast traffic so that the network is congested?
What attack floods networks with broadcast traffic so that the network is congested?