4-1. Operating systems are identified primarily by _____.4-2. Reading banners is an example of _____.4-3. DoS attacks aim at _____.4-4. In which of the following does the victim crash after receiving a single attack packet?4-5. SYN flooding is effective because of an asymmetry in the work that the sender and receiver must do.4-6. Which of the following DoS attacks uses many zombies to attack the victim?4-7. Which of the following uses routers in which broadcasting has been left on?4-8. File infector viruses infect _____.Questions Based on Class Notes & Chapter 4 4-1. Operating systems are identified primarily by _____.a. fingerprintingb. host scanningc. port scanningd. protocol scanninge. ping scanning.4-2. Reading banners is an example of _____.a. active fingerprintingb. passive fingerprinting4-3. DoS attacks aim at _____.a. confidentialityb. integrityc. availabilityd. All of the above about equally.4-4. In which of the following does the victim crash after receiving a single attack packet?a. LANDb. Smurfc. Both of the above.d. Neither a. nor b.4-5. SYN flooding is effective because of an asymmetry in the work that the sender and receiver must do.a. Trueb. False4-6. Which of the following DoS attacks uses many zombies to attack the victim?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above. Page 1 of 24-7. Which of the following uses routers in which broadcasting has been left on?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above.4-8. File infector viruses infect _____.a. data filesb. boot sectorsc. Both of the above.d. Neither a. nor b. Page 2 of
View Full Document