1 Which Statement Describes Phone Freaking?
1 Which Statement Describes Phone Freaking?
1 Which Statement Describes Phone Freaking?
o A.
o B.
o C.
o D.
• 2.
o A.
o B.
o C.
Buffer overflow attacks write data beyond the allocated buffer memory to
overwrite valid data or exploit systems to execute malicious code. .
o D.
Port scanning attacks scan a range of TCP or UDP port numbers on a host to
detect listening services.
o E.
Trust exploitation attacks can use a laptop acting as a rogue access point to
capture and copy all network traffic in a public location on a wireless hotspot.
• 3.
Which type of software typically uses a network adapter card in promiscuous mode to
capture all network packets that are sent across a LAN?
o A.
Port scanner
o B.
Ping sweeper
o C.
Packet sniffer
o D.
• 4.
o A.
o B.
o C.
o D.
Identify peripheral configurations
o E.
• 5.
o A.
A ping sweep is a network scanning technique that indicates the live hosts in a
range of IP addresses.
o B.
A ping sweep is a software application that enables the capture of all network
packets sent across a LAN.
o C.
A ping sweep is a scanning technique that examines a range of TCP or UDP port
numbers on a host to detect listening services.
o D.
A ping sweep is a query and response protocol that identifies information about a
domain, including the addresses assigned to that domain.
• 6.
Discuss
o A.
o B.
o C.
They are difficult to conduct and are initiated only by very skilled attackers.
o D.
o E.
• 7.
o A.
o B.
Large amounts of network traffic are sent to a target device to make resources
unavailable to intended users.
o C.
Improperly formatted packets are forwarded to a target device to cause the target
system to crash.
o D.
A program writes data beyond the allocated memory to enable the execution of
malicious code.
• 8.
o A.
MARS
o B.
NAC
o C.
CSA
o D.
VPN
• 9.
o A.
o B.
o C.
o D.
o E.
• 10.
o A.
o B.
Modification of system files and registry settings to ensure that the attack code is
running
o C.
• 11.
An attacker is using a laptop as a rogue access point to capture all network traffic from a
targeted user. Which type of attack is this?
o A.
Trust exploitation
o B.
Buffer overflow
o C.
o D.
Port redirection
• 12.
o A.
Denial of Service
o B.
Port redirection
o C.
Reconnaissance
o D.
Trust exploitation
• 13.
13 Which phase of worm mitigation involves terminating the worm process, removing
modified files or system settings that the worm introduced, and patching the vulnerability
that the worm used to exploit the system?
o A.
Containment
o B.
Inoculation
o C.
Quarantine
o D.
Treatment
• 14.
o A.
Containment phase
o B.
Inoculation phase
o C.
Quarantine phase
o D.
Treatment phase
• 15.
What are three types of access attacks? (Choose three.)
o A.
Buffer overflow
o B.
Ping sweep
o C.
Port redirection
o D.
Trust exploitation
o E.
Port scan
• 16.
Which type of security threat can be described as software that attaches to another
program to execute a specific unwanted function ?
o A.
Virus
o B.
Worm
o C.
o D.
• 17.
o B.
o C.
o D.
A Trojan Horse can be hard to detect because it closes when the application that
launches it closes