Which of the following is the description of a land attack

Assignment Help English
Reference no: EM131478025

Question 1.1. An activist can best be described as which of the following?

An unskilled programmer that spreads malicious scripts

Consider themselves seekers of knowledge

Use DoS attacks on websites with which they disagree

Deface websites by leaving messages for their friends to read

Question 2.2. Which type of firewall policy calls for a firewall to deny all traffic by default?

Permissive policy

Perimeter policy

Restrictive policy

Demilitarized policy

Question 3.3.What is a program that appears to do something useful but is actually malware?

Virus

Logic bomb

Trojan

Back door

Question 4.4.In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?

Basic

Challenge/response

Biometrics

Signature

Question 5.5.Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?

Malicious port scanning

Man-in-the-middle

Denial of service

Remote procedure call

Question 6.6.How large is the IPv6 address space?

32 bits

128 bits

64 bits

168 bits

Question 7.7.Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

TTL

Fragment Offset

ECN

Options

Question 8.8.Which protocol is responsible for automatic assignment of IP addresses?

DNS

DHCP

FTP

SNMP

Question 9.9.Which of the following is not an advantage of IPv6 versus IPv4?

Larger address space

Built-in security

Supports static configuration

NAT is unnecessary

Question 10.10.Which of the following is a valid IPv6 address?

5BA4:2391:0:0:4C3E

1080::8:800:200C:417A

24::5B1A::346C

5510:ABCD::34:1::2

Question 11.11.Which TCP flag can be the default response to a probe on a closed port?

RST

URG

PSH

SYN

Question 12.12.Which of the following is the description of a land attack?

The local host source address occurs in the packet.

Source and destination IP address/port are the same.

An illegal TCP flag is found in the segment header.

The attacker uses an undefined protocol number.

Question 13.13.What is the typical packet sequence for closing a TCP session?

FIN, FIN ACK, RST

FIN, ACK, FIN ACK, ACK

FIN ACK, FIN, ACK, RST

FIN, FIN ACK

Question 14.14.Which of the following is an element of the TCP header that can indicate that a connection has been established?

Flags

Stream index

SEQ/ACK analysis

Sequence number

Question 15.15.Of what category of attack is a DoS attack an example?

Bad header information

Single-packet attack

Multiple-packet attack

Suspicious data payload

Question 16.16.What uses mathematical calculations to compare routes based on some measurement of distance?

Route summarization

Link-state routing protocols

Routing metrics

Distance-vector routing protocols

Question 17.17.Which protocol that runs on Cisco routers shares information between Cisco devices?

CDP

TCP

bootp

SSH

Question 18.18.Which of the following is true about ACLs on Cisco routers?

There is an implicit deny any statement at the end of the ACL.

There is an explicit permit any statement at the beginning of the ACL.

ACLs are processed in reverse order so place high priority statements last.

ACLs bound to an interface apply to inbound and outbound traffic by default.

Question 19.19.Which of the following types of traffic does NOT travel through routers?

DNS zone transfers

ARP requests

SNMP status information

Network route information

Question 20.20.Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?

Console

AUX

Enable

TTY

Reference no: EM131478025

Questions Cloud

Constitute promotion within your marketing plan : Understand and incorporate the various elements that constitute Promotion within your marketing plan.
How to measure managerial overconfidence : Explain how to test for the effect of managerial overconfidence on the sensitivity of a firm's investments to cash flow and discuss the likely result.
Describe how the business is changing : A brief summary of the company does and how the business is changing. Advantages and Disadvantages of financing alternatives. What you would recommend and why.
What specific quantitative methods : Describe what specific quantitative methods are used in your organization including naming the methods, and their specific purpose or desired outcome.
Which of the following is the description of a land attack : Which of the following types of passwords prevents a user from accessing privileged exec mode on a Cisco router?
Example of a project that you have worked : Give an example of a project that you have worked on either at work or at home. Explain what makes it a project including project attributes.
Write a paper on hazardous material - lead paint : Investigate hazardous/building materials and chemicals which may be present in buildings. These include: Arsenic treating of termites
Define capital budgeting context : Why are managers of firms likely to be overconfident when they make capital budgeting decisions?
Technology has impacted the education industry : 1. Describe some of the ways technology has impacted the education industry

Reviews

Write a Review

English Questions & Answers

  Write a profile

Write a profile on bishop poleni.

  Education system

Write a rearch paper on education system

  Write an report

The U.S. President Barack Obama said America can "win the future" by rebuilding its manufacturing sector (on June 8, 2011, after visiting an automotive training center at a community college in Virginia, outside Washington). Do you agree, and why?

  Discuss the accuracy of this statement

'Consideration does not have to be adequate or commercially realistic, nor does it need to be expressed in monetary terms, it merely needs to be "sufficient".' Discuss the accuracy of this statement.

  Write an essay on the youngest billionaire

Write an essay on the youngest billionaire

  Transformational leadership in the public sector

The more hierarchical an organization's authority structure, the lower the reported practice of transformational leadership behaviors.

  Modal verbs or modal constructions

Identify all the modal verbs or modal constructions in the passage

  Write a latter to mom thanking to adopting and caring

Write a latter to mom thanking for adopting and caring,

  Ways of knowing & authority in your discipline

To explore and become familiar with your discipline; to prepare you for your major researched essay.

  Writing an effective business letter

Prepare a letter in either block or modified block format, addressed to your employer or supervisor and copied to your marker.

  Discuss the kingdom of saudi arabia

Discuss the Kingdom of Saudi Arabia

  Developing an annotated bibliography

Developing an annotated bibliography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd