5-2-2022

1 October 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
which of the following is the best countermeasure against man-in-the-middle attacks?
answer
IPSec
question
what is modified in the most common form of spoofing on a typical IP packet?
answer
source address
question
which type of activity changes or falsifies info in order to mislead or re-direct traffic?
answer
spoofing
question
which of the following describes a man in the middle attack?
answer
a false server intercepts communications from a client by impersonating the intended server
question
capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which attack?
answer
man in the middle attack
question
when the TCP/IP session state is manipulated so that a third party is able to insert alternate packers into the communication stream, what type of attack has pccured?
answer
hijacking
question
what is the goal of TCP/IP hijacking attack?
answer
executing commands or accessing resources on a system the attacker does not otherwise have authorization to access
question
which of the following is not a protection against session hijacking?
answer
DHCP reservations
question
which of the following is the most effective protection against IP packet spoofing on a private network?
answer
ingress and egress filters
question
while using the internet, you type of URL of one of your favorite sites in the browser. instead of going to the correct site, however, the browser displays a completely different website. when you use the IP address of the web server, the correct site is displayed. which type of attack has likely occurred?
answer
DNS poisoning
question
which of the following attacks tries to associate an incorrect MAC address with a known IP address?
answer
ARP poisoning
question
what are the most common network traffic packets captured and used in a rpelay attack?
answer
authentication
question
when a malicious user captures authentication traffic and replays it against the network later, what is the security problem you are most concerned about?
answer
an unauthorized user gaining access to sensitive resources
question
a router on the border of your network detects a packet with a source address that is from an internal client, but the packet was received on the internet-facing interface. this is an example of what form of attack?
answer
spoofing
question
an attacker uses an exploit to push a modified hosts file to client systems. the hosts file redirects traffic from legitimate tax prepapration sites to malicious sites to gather personal and financial information. what kind of exploit has been used in this scenario?
answer
-DNS poisoning -pharming