Which two are software vulnerability scanners? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two are software vulnerability scanners? (Choose two.) VmStat Nessus fingerprint open VAS Explanation & Hint: Two examples of software vulnerability scanners are: Nessus Nessus is a widely known and…

Continue ReadingWhich two are software vulnerability scanners? (Choose two.)

What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim’s IP address?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger…

Continue ReadingWhat type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger replies that are to be sent to the victim’s IP address?

Which two of the following statements are true regarding early TCP/IP development? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Which two of the following statements are true regarding early TCP/IP development? (Choose two.) TCP/IP was the only network protocol suite available and was developed for internet work environments. The…

Continue ReadingWhich two of the following statements are true regarding early TCP/IP development? (Choose two.)

What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets,…

Continue ReadingWhat type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets, such that each packet has the IP address of the intended target rather than the IP address of the attacker as its source address?

What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?…

Continue ReadingWhat is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?

Which protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker? SSH traceroute ping TCP Explanation & Hint: The…

Continue ReadingWhich protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker?

What phase of the TCP communication process is attacked during a TCP SYN flood attack?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What phase of the TCP communication process is attacked during a TCP SYN flood attack? three-way handshake connection established connection closed connection reset Explanation & Hint: A TCP SYN flood…

Continue ReadingWhat phase of the TCP communication process is attacked during a TCP SYN flood attack?

What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses? MAC spoofing IP spoofing application spoofing name spoofing Explanation & Hint: The…

Continue ReadingWhat type of spoofing attack uses fake source IP addresses that are different than their real IP addresses?

A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack? red rat Fraggle smurf SYN flood firewalk Explanation & Hint:…

Continue ReadingA ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack?

What type of IP attack occurs when an attacker inserts itself into a communication session and then takes over the session?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of IP attack occurs when an attacker inserts itself into a communication session and then takes over the session? MAC address flooding attack session hijacking DHCP depletion attack…

Continue ReadingWhat type of IP attack occurs when an attacker inserts itself into a communication session and then takes over the session?

Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change? source port destination port UDP length UDP…

Continue ReadingWhich part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change?

What two types of attacks are examples of ICMP DoS attacks? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What two types of attacks are examples of ICMP DoS attacks? (Choose two.) smurf attack blooming onion attack ping of death attack DHCP depletion attack Explanation & Hint: Two types…

Continue ReadingWhat two types of attacks are examples of ICMP DoS attacks? (Choose two.)

Which three types of devices can do network address translation (NAT)? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which three types of devices can do network address translation (NAT)? (Choose three.) routers Layer 3 switches bridges wireless access points firewalls Explanation & Hint: The three types of devices…

Continue ReadingWhich three types of devices can do network address translation (NAT)? (Choose three.)