Issc362 week 5 quiz | Computer Science homework help
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your paper.Write My Essay For Me
ISSC362 Week 5 Quiz Question 1 of 20 5.0 Points Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing? A.Wireshark B.Nemesis C.Etherape D.Cain Question 2 of 20 Which sniffer tool is designed to intercept and reveal passwords? A.Windump B.Dsniff C.Wireshark D.All of the above Question 3 of 20 Which of the following is a tool used for sniffing? A.Hunt B.Tcpdump C.Nemesis D.SMAC Question 4 of 20 Sniffing can be used to ___________. A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above Question 5 of 20 5.0 Points Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services? A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel Question 6 of 20 5.0 Points Which of the following attacks sends out bogus requests to any requesting device and the switch? A.Spoofing B.Flooding C.Poisoning D.Hijacking Question 7 of 20 Which of the following protocols is not easily sniffed? A.SMTP B.HTTP C.SSH D.Telnet Question 8 of 20 5.0 Points Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network? A.Sniffing B.Hijacking C.Denial of service D.Covert channel Question 9 of 20 5.0 Points Which of the following takes place on networks such as those that have a hub as the connectivity device? A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing Question 10 of 20 5.0 Points Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash? A.Fraggle B.Smurf C.Land D.Teardrop Question 11 of 20 Who originally designed and created Linux? A.Bill Gates B.Linus Torvalds C.Steve Jobs D.Joseph Linux Question 12 of 20 Which of the following is an application-level scanner? A.Flawfinder B.SARA C.VLAD D.Nikto Simple Question 13 of 20 5.0 Points Which of the following is an early Linux firewall technology that controls traffic by checking packets? A.ipchains B.iptables C.ipconfig D.ip host Question 14 of 20 5.0 Points In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued? A.dir/p B.ls -l C.cp -v D.rm -al Question 15 of 20 5.0 Points Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system? A./dev B./etc C./bin D./var Question 16 of 20 5.0 Points Which of the following Linux directories is the location of files that dictates access between hardware and the operating system? A./dev B./etc C./bin D./var Question 17 of 20 5.0 Points Most versions of Linux make their source code available through which of the following methods? A.General Public License (GPL) B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE) D.UNIX Question 18 of 20 The core component of every operating system is which of the following? A.Kernel B.Shell C.User interface D.BIOS Question 19 of 20 In Linux, which of the following correctly denotes a hard drive in a machine? A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/ Question 20 of 20 Approximately how many distributions of Linux are available in different forms and formats? A.100 B.200 C.1,000 D.2,000
The post Issc362 week 5 quiz | Computer Science homework help appeared first on Academic Works Help.