Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. A hacker who sends an email but replaces his return remail address with a fak

ID: 3826443 • Letter: 1

Question

1. A hacker who sends an email but replaces his return remail address with a fake one is _ the email address

A Hardening

B Malware

C Spoofing

D emulating

2.Which of the following is a tool to prevent ARP cache poisoning?

A. DHCP

B. DAI

C. Edge Firewall

D. DNS Snooping

3 A computer compromised with malware to support a botnet is called a

A zombie

B reflection

C DDoS

D locked node

4 The goal of a DoS attack is to make the attacked system process each request for as long as possible. This is called

A reflection

B rotation

C destruction

D amplification

5Which is an ancient form of DoS attack?

A DDoS

B Ping

C Smurf

D Arrow

6 An attack where someone tries to hack a password using every possible password permutation is called what?

A Man-in-the-middle

B Spoofing

C Rainbow

D Brute Force

7 Which Windows utility would most easily show you open ports on a host?

A netstat

B ping

C ipconfig

D nbtstat

8 Which of the following protocols are notorious for cleartext passwords? (pick2 )

A SSH

BTelnet

C HTTPS
D POP3

9 The NSAs TEMPEST security standards are used to combat which risk?

A RF emantation

B Spoofing

C DDoS

D Malware

10 Bob is told by his administrator to go to www.runthisantimalware.com and click te run the program button on that site to check for maleware. What form of anti malware delivery is this called?

A Host-based

B Network- based

C Cloud-based

D FTP based

Explanation / Answer

1. Ans) c. Spoofing

2. Ans) a. DHCP

3. Ans) a. Zombie

4. Ans) d. Amplification

5. Ans) c. Smurf

6. Ans) d. Brute force

7. Ans) a. Netstat

8. Ans) b. Telnet, d. Pop3

9. Ans) b. Spoofing

10. Ans) c. Cloud based.