1. A hacker who sends an email but replaces his return remail address with a fak
ID: 3826443 • Letter: 1
Question
1. A hacker who sends an email but replaces his return remail address with a fake one is _ the email address
A Hardening
B Malware
C Spoofing
D emulating
2.Which of the following is a tool to prevent ARP cache poisoning?
A. DHCP
B. DAI
C. Edge Firewall
D. DNS Snooping
3 A computer compromised with malware to support a botnet is called a
A zombie
B reflection
C DDoS
D locked node
4 The goal of a DoS attack is to make the attacked system process each request for as long as possible. This is called
A reflection
B rotation
C destruction
D amplification
5Which is an ancient form of DoS attack?
A DDoS
B Ping
C Smurf
D Arrow
6 An attack where someone tries to hack a password using every possible password permutation is called what?
A Man-in-the-middle
B Spoofing
C Rainbow
D Brute Force
7 Which Windows utility would most easily show you open ports on a host?
A netstat
B ping
C ipconfig
D nbtstat
8 Which of the following protocols are notorious for cleartext passwords? (pick2 )
A SSH
BTelnet
C HTTPS
D POP3
9 The NSAs TEMPEST security standards are used to combat which risk?
A RF emantation
B Spoofing
C DDoS
D Malware
10 Bob is told by his administrator to go to www.runthisantimalware.com and click te run the program button on that site to check for maleware. What form of anti malware delivery is this called?
A Host-based
B Network- based
C Cloud-based
D FTP based
Explanation / Answer
1. Ans) c. Spoofing
2. Ans) a. DHCP
3. Ans) a. Zombie
4. Ans) d. Amplification
5. Ans) c. Smurf
6. Ans) d. Brute force
7. Ans) a. Netstat
8. Ans) b. Telnet, d. Pop3
9. Ans) b. Spoofing
10. Ans) c. Cloud based.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.