Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

16. A war-dialing tool provides: 16.1 A list of Web servers; 16.2 A list of inst

ID: 3725232 • Letter: 1

Question

16. A war-dialing tool provides: 16.1 A list of Web servers; 16.2 A list of installed protocols; 16.3 A list of all nodes to the destination; 16.4 A list of discovered telephone lines with modems. 17. Finding a live host is based on: 17.1 Traceroute utility; 17.2 Ping utility 17.3 Redirect utility; 17.4 Find a host utility 18 For learning network topology: 18.1 Traceroute 18.2 Ping; 18.3 HTTP protocol; 18.4 FTP protocol is used. 19. A network-based IDS captures: 19.1 All data on the LAN; 19.2 Only viruses; 19.3 Only programs; 19.4 Only malicious program. 20 The tiny fragment attack: 20.1 Designed to overload network with many small fragment; 20.2 Designed to suppress all small packets; 20.3 Designed to fool the IDS by creating very small packet; 20.4 Designed to generate only small fragments.

Explanation / Answer

16. A war-dialing tool provides:

         16.4 A list of discovered telephone lines with modems.

A war dialing toos scan a list of phone numbersbasically a local dial every number in a area with area code to serch modem, computers, fax machine, computer servers.

17. Finding a live host is based on:

       17.4 find_a_host utility

Finding a host in live based on find a host on the same network. when user scan the system it will give the result on the netwrok host available with ip address.

18.For learning network topology:

      18.3 HTTP protocol is used

Network topology is network connected with serveral machine or computers to communicate between them are used HTTP protocols to transmit the data between them.

19. A network-based IDS captures:

   19.1 All data on the LAN

Network based Intrusion Detection System (NIDS) scans the all inbound and outbound pakets and searches for the suspicious pattern. When threat are detected they inform the administrator or banned the IP address to access them.

20. A tiny fragment attack

   20.3 Designed to to generate only small fragments.

Tiny fragment designed to generate only small fragments to fool the IDS of the attackers.

      

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote