DOC PREVIEW
EIU MIS 4850 - MIS 4850 Chapter 4 Reading Question

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

4-1. Operating systems are identified primarily by _____.4-2. Reading banners is an example of _____.4-3. DoS attacks aim at _____.4-4. In which of the following does the victim crash after receiving a single attack packet?4-5. SYN flooding is effective _____.4-6. Which of the following DoS attacks uses many zombies to attack the victim?4-7. Which of the following uses routers in which broadcasting has been left on?4-8. File infector viruses infect _____.Chapter 4 Reading Questions4-1. Operating systems are identified primarily by _____.a. fingerprintingb. host scanningc. port scanningd. protocol scanninge. ping scanning.4-2. Reading banners is an example of _____.a. active fingerprintingb. passive fingerprinting4-3. DoS attacks aim at _____.a. confidentialityb. integrityc. availabilityd. All of the above about equally.4-4. In which of the following does the victim crash after receiving a single attack packet?a. LANDb. Smurfc. Both of the above.d. Neither a. nor b.4-5. SYN flooding is effective _____.a. because of an asymmetry in the work that the sender and receiver must do.b. because the basic protocol is flawedc. because SYN messages are encapsulated and so cannot be traced back to the attackerd. because it is based on DDoS4-6. Which of the following DoS attacks uses many zombies to attack the victim?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above. Page 1 of 24-7. Which of the following uses routers in which broadcasting has been left on?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above.4-8. File infector viruses infect _____.a. data filesb. boot sectorsc. Both of the above.d. Neither a. nor b. Page 2 of


View Full Document
Download MIS 4850 Chapter 4 Reading Question
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view MIS 4850 Chapter 4 Reading Question and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view MIS 4850 Chapter 4 Reading Question 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?