Professional Documents
Culture Documents
(Version 1.0)
Time Remaining:
3 Which type of software typically uses a network adapter card in promiscuous mode
to capture all network packets that are sent across a LAN?
port scanner
ping sweeper
()packet sniffer
Internet information query
()A ping sweep is a network scanning technique that indicates the live hosts in a
range of IP addresses.
A ping sweep is a software application that enables the capture of all network
packets sent across a LAN.
A ping sweep is a scanning technique that examines a range of TCP or UDP port
numbers on a host to detect listening services.
A ping sweep is a query and response protocol that identifies information about a
domain, including the addresses assigned to that domain.
They are difficult to conduct and are initiated only by very skilled attackers.
They are commonly launched with a tool called L0phtCrack.
()Examples include smurf attacks and ping of death attacks.
MARS
NAC
()CSA
VPN
trust exploitation
buffer overflow
()man in the middle
port redirection
Denial of Service
port redirection
()reconnaissance
trust exploitation
13 Which phase of worm mitigation involves terminating the worm process, removing
modified files or system settings that the worm introduced, and patching the
vulnerability that the worm used to exploit the system?
containment
inoculation
quarantine
()treatment
()containment phase
inoculation phase
quarantine phase
treatment phase
()buffer overflow
ping sweep
()port redirection
()trust exploitation
port scan
Internet information query
()virus
worm
proxy Trojan horse
Denial of Service Trojan horse
20 What are the three major components of a worm attack? (Choose three.)
enabling vulnerability ()
infecting vulnerability
payload ()
penetration mechanism
probing mechanism
propagation mechanism ()