16. A war-dialing tool provides: 16.1 A list of Web servers; 16.2 A list of inst
ID: 3725232 • Letter: 1
Question
16. A war-dialing tool provides: 16.1 A list of Web servers; 16.2 A list of installed protocols; 16.3 A list of all nodes to the destination; 16.4 A list of discovered telephone lines with modems. 17. Finding a live host is based on: 17.1 Traceroute utility; 17.2 Ping utility 17.3 Redirect utility; 17.4 Find a host utility 18 For learning network topology: 18.1 Traceroute 18.2 Ping; 18.3 HTTP protocol; 18.4 FTP protocol is used. 19. A network-based IDS captures: 19.1 All data on the LAN; 19.2 Only viruses; 19.3 Only programs; 19.4 Only malicious program. 20 The tiny fragment attack: 20.1 Designed to overload network with many small fragment; 20.2 Designed to suppress all small packets; 20.3 Designed to fool the IDS by creating very small packet; 20.4 Designed to generate only small fragments.Explanation / Answer
16. A war-dialing tool provides:
16.4 A list of discovered telephone lines with modems.
A war dialing toos scan a list of phone numbersbasically a local dial every number in a area with area code to serch modem, computers, fax machine, computer servers.
17. Finding a live host is based on:
17.4 find_a_host utility
Finding a host in live based on find a host on the same network. when user scan the system it will give the result on the netwrok host available with ip address.
18.For learning network topology:
18.3 HTTP protocol is used
Network topology is network connected with serveral machine or computers to communicate between them are used HTTP protocols to transmit the data between them.
19. A network-based IDS captures:
19.1 All data on the LAN
Network based Intrusion Detection System (NIDS) scans the all inbound and outbound pakets and searches for the suspicious pattern. When threat are detected they inform the administrator or banned the IP address to access them.
20. A tiny fragment attack
20.3 Designed to to generate only small fragments.
Tiny fragment designed to generate only small fragments to fool the IDS of the attackers.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.