1. _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's...
Question:
1. _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's computer, through the attacker’s computer, and then to the destination computer.
A. MAC cloning attack
B. ARP DoS attack
C. ARP on-path (person-in-the-middle) attack
D. MAC flooding attack
2.
What is an attack that causes normally available services to be unavailable?
A. DoS
B. MAC flood attack
C. operational technology (OT)
D. on-path (person-in-the-middle)
3. What is a command language interpreter that runs on a command line that is used to interact with Unix and Linux?
A. Bash
B. Macros
C. PowerShell
D. VBA
4. What is a way to bypass a wireless network filter?
A. ARP on-path (person-in-the-middle) attack
B. MAC cloning attack
C. ARP DoS attack
D. MAC flooding attack
5. What are programs in PowerShell?
A. Python
B. VBA
C. Cmdlets
D. Bash
6. What is a 48-bit address used to identify network interface cards? It’s also called “hardware address” or “physical address.”
A. switch
B. MAC
C. ARP
D. DNS
7. What kind of attack is not done on RFID technology?
A. replay attack
B. spoofing
C. DoS
D. IV attack
8. You keep getting unsolicited messages on your Bluetooth devices. What kind of attack is this?
A. rogue AP attack
B. bluejacking
C. jamming attack
D. bluesnarfing
9. Which of the following runs on Windows OS, MacOS, Linux, and Unix?
A. Python
B. Bash
C. Macros
D. PowerShell
10. What is a command-line shell that can be used to manage almost every aspect of the Windows operating system?
A. Macros
B. Python
C. Bash
D. PowerShell
Computer Networking A Top-Down Approach
ISBN: 978-0133594140
7th edition
Authors: James Kurose, Keith Ross