Which sniffer tool is designed to intercept passwords

Assignment Help Computer Engineering
Reference no: EM131607108

Assignment

Question 1
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?
A.Wireshark B.Nemesis C.Etherape D.Cain

Question 2
Which sniffer tool is designed to intercept and reveal passwords?
A.Windump B.Dsniff C.Wireshark D.All of the above

Question 3
Which of the following is a tool used for sniffing?
A.Hunt B.Tcpdump C.Nemesis D.SMAC

Question 4
Sniffing can be used to ___________.
A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above

Question 5
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel

Question 6
Which of the following attacks sends out bogus requests to any requesting device and the switch?
A.Spoofing B.Flooding C.Poisoning D.Hijacking

Question 7
Which of the following protocols is not easily sniffed?
A.SMTP B.HTTP C.SSH D.Telnet

Question 8
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?
A.Sniffing B.Hijacking C.Denial of service D.Covert channel

Question 9
Which of the following takes place on networks such as those that have a hub as the connectivity device?
A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing

Question 10
Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash?
A.Fraggle B.Smurf C.Land D.Teardrop

Question 11
Who originally designed and created Linux?
A.Bill Gates B.Linus Torvalds
C.Steve Jobs D.Joseph Linux

Question 12
Which of the following is an application-level scanner?
A.Flawfinder B.SARA C.VLAD D.Nikto Simple

Question 13
Which of the following is an early Linux firewall technology that controls traffic by checking packets?
A.ipchains B.iptables C.ipconfig D.ip host

Question 14
In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued?
A.dir/p B.ls -l C.cp -v D.rm -al

Question 15
Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?
A./dev B./etc C./bin D./var

Question 16
Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?
A./dev B./etc C./bin D./var

Question 17
Most versions of Linux make their source code available through which of the following methods?
A.General Public License (GPL)?B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE)?D.UNIX

Question 18
The core component of every operating system is which of the following?
A.Kernel B.Shell?C.User interface D.BIOS

Question 19
In Linux, which of the following correctly denotes a hard drive in a machine?
A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/

Question 20
Approximately how many distributions of Linux are available in different forms and formats?
A.100 B.200 C.1,000 D.2,000.

Reference no: EM131607108

Questions Cloud

Find the mass of the portion of the atmosphere : An exponential model for the density of the earth's atmosphere says that if the temperature of the atmosphere were constant, then the density of the atmosphere.
What is the expected return for dalton stock : What is the growth rate for Dalton? Inc.? What is the expected return for Dalton's stock?
Analyze and compare various server management software : Your tasks are to investigate and document some of the most used TCP/IP connectivity utilities on Linux and Windows Operating Systems
Define how is race socially constructed : How is race socially constructed. Should race and ethnicity be referred to as deviant
Which sniffer tool is designed to intercept passwords : Which sniffer tool is designed to intercept and reveal passwords? Which of following is an application-level scanner? Who originally designed and created Linux?
Find the total amount of water lost in the first minute : Water leaks out of a tank through a square hole with 1- inch sides. At time t (in seconds) the velocity of water flowing through the hole is v = g(t) ft/sec.
State of texas as a regional airline : Southwest Airlines began with flights within the state of Texas as a regional airline operating four aircraft. When airline deregulation occurred nationally.
Examines the basic positions of each of the five religious : How does that overlap or contradict with the major religions' uses of reason in explaining evil?
Some preliminary budget discussions : Derrick and his supervisor are having some preliminary budget discussions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd