Match the following terms to the appropriate defnitions. An attack that uses the
ID: 3890267 • Letter: M
Question
Match the following terms to the appropriate defnitions. An attack that uses the Intemet Control Message Protocol (ICMP) to flood a victim with packets a. Address Resolution Protocol (ARP) b. ARP Poisoning c. Buffer overflow attack d. Command injection e. scripting (XSS) Injecting and executing commands to execute on a server v An attack that corrupts the ARP cache v A form of verification used when accessing a secure web application v An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer vAn attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim v Another name for locally shared object (LSO) v Part of the TCP/IP protocol for determining the MAC address based on the IP address. An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's devic vAn attack that injects scripts into a web application server to direct attacks at clients Cross-site f. DNS poisoning g. Flash cookie h. Ping flood L Session token j Smurf attackExplanation / Answer
Ping Flood - An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
Command Injection - Injecting and executing commands to execute on a server.
Session Token - A form of verification used when accessing a secure Web application.
Smurf Attack - An attack that broadcasts a ping request to all computers on the network yet changes the address from which the request came to that of the target.
Cross-Site Scripting (XSS) - An attack that injects scripts into a Web application server to direct attacks at clients.
ARP Poisoning - An attack that corrupts the ARP cache.
Flash cookies - A cookie named after the Adobe Flash player. Also known as local shared objects (LSO's).
DNS Poisoning - An attack that substitutes DNS addresses so that the computer is automatically redirected to another device.
ARP - is used to discover the MAC address of a client based on its IP address
Buffer Overflow Attack - An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
With the help of the above information, we can match the options as:
1 --> h
2 --> d
3 --> b
4 --> i
5 --> c
6 --> j
7 --> g
8 --> a
9 --> f
10 -> e
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.