Computer Networks Questions & Answers – Network
Attacks
1. The attackers a network of
compromised devices known as
a) Internet
b) Botnet
c) Telnet
d) D-net
a) Internet
b) Botnet
c) Telnet
d) D-net
Answer: b
Explanation: None.
Explanation: None.
2. Which of the following is a form
of DoS attack ?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
3. The DoS attack is which the
attacker establishes a large number of half-open or fully open TCP connections
at the target host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: c
Explanation: None.
Explanation: None.
4. The DoS attack is which the
attacker sends deluge of packets to the targeted host
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
Answer: b
Explanation: None.
Explanation: None.
5. Packet sniffers involve
a) Active receiver
b) Passive receiver
c) Both Active receiver and Passive receiver
d) None of the mentioned
a) Active receiver
b) Passive receiver
c) Both Active receiver and Passive receiver
d) None of the mentioned
Answer: b
Explanation: They donot inject packets into the channel.
Explanation: They donot inject packets into the channel.
6. Sniffers can be deployed in
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
a) Wired environment
b) WiFi
c) Ethernet LAN
d) All of the mentioned
Answer: d
Explanation: None.
Explanation: None.
7. Firewalls are often configured to
block
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
a) UDP traffic
b) TCP traffic
c) Both of the mentioned
d) None of the mentioned
ليست هناك تعليقات:
إرسال تعليق