Part 1 of 1 - 100.0 Points
Question 1 of 20
5.0 Points
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?
A.Wireshark
B.Nemesis
C.Etherape
Correct D.Cain
Answer Key: D
Question 2 of 20
5.0 Points
Which sniffer tool is designed to intercept and reveal passwords?
A.Windump
Correct B.Dsniff
C.Wireshark
D.All of the above
Answer Key: B
Question 3 of 20
5.0 Points
Which of the following is a tool used for sniffing?
A.Hunt
Correct B.Tcpdump
C.Nemesis
D.SMAC
Answer Key: B
Question 4 of 20
5.0 Points
Sniffing can be used to ___________.
A.troubleshoot connections
B.investigate malware
C.detect abnormal behavior
Correct D.All of the above
Answer Key: D
Question 5 of 20
5.0 Points
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
A.Passive session hijacking
B.Active session hijacking
Correct C.Denial of Service
D.Covert channel
Answer Key: C
Question 6 of 20
5.0 Points
Which of the following attacks sends out bogus requests to any requesting device and the switch?
A.Spoofing
B.Flooding
Correct C.Poisoning
D.Hijacking
Answer Key: C
Question 7 of 20
5.0 Points
Which of the following protocols is not easily sniffed?
A.SMTP
B.HTTP
Correct C.SSH
D.Telnet
Answer Key: C
Question 8 of 20
5.0 Points
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?
A.Sniffing
Correct B.Hijacking
C.Denial of service
D.Covert channel
Answer Key: B
Question 9 of 20
5.0 Points
Which of the following takes place on networks such as those that have a hub as the connectivity device?
Correct A.Passive sniffing
B.Promiscuous sniffing
C.Active sniffing
D.Switched sniffing
Answer Key: A...