Question: 22. solves the ACK storm issue and facilitates TCP session hijacking. a. SSL b. Storm watching c. Packet blocking d. Encryption 23. The attacks made
22. solves the ACK storm issue and facilitates TCP session hijacking. a. SSL b. Storm watching c. Packet blocking d. Encryption 23. The attacks made through proxy servers include bufer overflow attacks, denial-of-service attacks, and attacks. a. session-hijacking b. password cracking c. switch cracking d. router hijacking 24. is a Trojan horse designed and used to make a horde of zombies to do the hacker's bidding. a. NetBus b. Pretty Park c. BO2K d. AIDS 25. is a remote administration server that allows system administrators to control a computer from a remote location. a. Back Orifice b. Pretty Park c. AIDS d. PC-Write 26. A(n) occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations. a. involuntary DoS b. distributed DoS c. isolated Dos d. voluntary DoS 27. The_ utility is used to determine if a specific machine located at a specific IP address is online. a. Echo b. Ping c. ps d. Alive 28. allows users to access e-mail messages that remain on the mail server. a. SMTP b. SNMIP c. POP3 d. IMAP 29. The most widely used operating systems on larger servers is one of the many versions of
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
