ISSC362 Week 5 Quiz

ISSC362 Week 5 Quiz

Part 1 of 1 - 100.0 Points

Question 1 of 20
5.0 Points
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?
A.Wireshark
B.Nemesis
C.Etherape
Correct D.Cain

Answer Key: D
Question 2 of 20
5.0 Points
Which sniffer tool is designed to intercept and reveal passwords?
A.Windump
Correct B.Dsniff
C.Wireshark
D.All of the above

Answer Key: B
Question 3 of 20
5.0 Points
Which of the following is a tool used for sniffing?
A.Hunt
Correct B.Tcpdump
C.Nemesis
D.SMAC

Answer Key: B
Question 4 of 20
5.0 Points
Sniffing can be used to ___________.
A.troubleshoot connections
B.investigate malware
C.detect abnormal behavior
Correct D.All of the above

Answer Key: D
Question 5 of 20
5.0 Points
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
A.Passive session hijacking
B.Active session hijacking
Correct C.Denial of Service
D.Covert channel

Answer Key: C
Question 6 of 20
5.0 Points
Which of the following attacks sends out bogus requests to any requesting device and the switch?
A.Spoofing
B.Flooding
Correct C.Poisoning
D.Hijacking

Answer Key: C
Question 7 of 20
5.0 Points
Which of the following protocols is not easily sniffed?
A.SMTP
B.HTTP
Correct C.SSH
D.Telnet

Answer Key: C
Question 8 of 20
5.0 Points
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?
A.Sniffing
Correct B.Hijacking
C.Denial of service
D.Covert channel

Answer Key: B
Question 9 of 20
5.0 Points
Which of the following takes place on networks such as those that have a hub as the connectivity device?
Correct A.Passive sniffing
B.Promiscuous sniffing
C.Active sniffing
D.Switched sniffing

Answer Key: A...

Similar Essays