Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. DNS poisoning
B. Keystroke logging
C. Mail bombing
Questions & Answers PDF
D. ARP poisoning
You work as a Network Administrator for NetTech Inc. When you enter http://188.8.131.52 in the
browser's address bar, you are able to access the site. But, you are unable to access the site when
you enter http://www.PassGuide.com. What is the most likely cause?
Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital
signatures whenever packets pass between two hosts on a network."
The Children's Online Privacy Protection Act makes it illegal for Web sites to collect information from
children under __ years of age without verifiable permission of a parent?
Which of the following law does not protect intellectual property?
Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?
Which of the following is not a level of military data-classification system?
Which of the following statements about DES (Data Encryption Standard) is true?
A ________ attack occurs when an attacker successfully inserts an intermediary software or program
between two communicating hosts.
Which of the following acts as an intermediary between a user on the internal network and a service
on the external network such as the Internet?