Unformatted text preview:

4-1. Operating systems are identified primarily by _____.4-2. Reading banners is an example of _____.4-3. DoS attacks aim at _____.4-4. In which of the following does the victim crash after receiving a single attack packet?4-5. SYN flooding is effective because of an asymmetry in the work that the sender and receiver must do.4-6. Which of the following DoS attacks uses many zombies to attack the victim?4-7. Which of the following uses routers in which broadcasting has been left on?4-8. File infector viruses infect _____.Questions Based on Class Notes & Chapter 4 4-1. Operating systems are identified primarily by _____.a. fingerprintingb. host scanningc. port scanningd. protocol scanninge. ping scanning.4-2. Reading banners is an example of _____.a. active fingerprintingb. passive fingerprinting4-3. DoS attacks aim at _____.a. confidentialityb. integrityc. availabilityd. All of the above about equally.4-4. In which of the following does the victim crash after receiving a single attack packet?a. LANDb. Smurfc. Both of the above.d. Neither a. nor b.4-5. SYN flooding is effective because of an asymmetry in the work that the sender and receiver must do.a. Trueb. False4-6. Which of the following DoS attacks uses many zombies to attack the victim?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above. Page 1 of 24-7. Which of the following uses routers in which broadcasting has been left on?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above.4-8. File infector viruses infect _____.a. data filesb. boot sectorsc. Both of the above.d. Neither a. nor b. Page 2 of


View Full Document
Download ReadingQuestionsCh4
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view ReadingQuestionsCh4 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view ReadingQuestionsCh4 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?