There are many purposes of malware, including the following Making a Computer Us
ID: 3665114 • Letter: T
Question
There are many purposes of malware, including the following
Making a Computer Useless
Disable Networking Functions
Obtaining Passwords
Remove the Default LAN Route
Which steps should be taken to increase web server security? (Select all that apply.)
Question 8 options:
a)
Remove unused application mappings.
b)
Enable remote administration.
c)
Apply service packs and hotfixes.
d)
Check for malicious input in forms and query strings.
What tool could an attacker use to capture sequence and acknowledgment numbers from a victim in order to track a network session?
Question 11 options:
Traceroute
Netstat
Network Sniffer
Nslookup
What are the three steps in session hijacking? (Select all that apply.)
Question 12 options:
Injecting the hacker’s packet.
Desynchronizing the connection.
Capturing the victim’s user name and password.
the act of predicting TCP sequence numbers is called ______________________.
Question 15 options:
a brute-force attack
blind hijacking
application hijacking
spoofing
Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be the ____________. This makes it possible to inject data into a communication stream.
Question 17 options:
ISN-1
ISN-2
ISN+1
ISN+2
Save
Previous PageNext Page
Making a Computer Useless
Disable Networking Functions
Obtaining Passwords
Remove the Default LAN Route
Explanation / Answer
1)There are many purposes of malware, including the following
A)Making a Computer Useless
2)Which steps should be taken to increase web server security?
d)
Check for malicious input in forms and query strings.
3)What tool could an attacker use to capture sequence and acknowledgment numbers from a victim in order to track a network session?
A)Network Sniffer
4)What are the three steps in session hijacking?
A)Injecting the hacker’s packet.
Capturing the victim’s user name and password.
5)the act of predicting TCP sequence numbers is called
A)blind hijacking or spoofing
6)Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be the ____________. This makes it possible to inject data into a communication stream.
A)ISN+1
d)
Check for malicious input in forms and query strings.
3)What tool could an attacker use to capture sequence and acknowledgment numbers from a victim in order to track a network session?
A)Network Sniffer
4)What are the three steps in session hijacking?
A)Injecting the hacker’s packet.
Capturing the victim’s user name and password.
5)the act of predicting TCP sequence numbers is called
A)blind hijacking or spoofing
6)Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be the ____________. This makes it possible to inject data into a communication stream.
A)ISN+1
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.