Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. (TCO 3) A _____ is a software or hardware device used to observe traffic as i

ID: 3768418 • Letter: 1

Question

1. (TCO 3) A _____ is a software or hardware device used to observe traffic as it passes through a network on shared broadcast media. (Points : 3)      

logic bomb
       network sniffer
       backdoor
       trapdoor

       a security risk
       not risky
       somewhat secure
       very secure

Question 2. 2. (TCO 3) A term used to refer to the process of taking control of an already existing session between a client and a server is _____. (Points : 3)        TCP/IP hijacking
       replay attacking
       a denial-of-service attack
       password guessing

Explanation / Answer

1.
Network sniffer.
Logic bomb basically means inserting a malicious code that can harm your system.
Trapdoor and backdoor are same, meaning providing unauthorized access

2.
TCP/IP hijacking is used to gain access to internet server of some other network.

3.
Worm attack basically spreads into the network and try to gain access to it. By multiplying into network, it tries to find loopholes in the network.

4.
Automatic execution of the vb script. The vb script was hidden from the users and they thought it's a txt file. Users tried to open text file and automatically a vb script started executing.

5.
Spam filters

6.
25

7.
Logic bomb(Explained in 1)

8.
is a framework for UDDI data structures to be passed between applications in a language-neutral and platform-independent fashion

9.
SSL for security purpose

10.
a scurity risk, as logic bombs can be incorporated in java applets.