Datasheet

6
What type of attack involves the hacker sending too much data to the applica-
tion, which normally results in administrative access within a command shell?
A Spoof attack
B Buffer overflow attack
C Social engineering attack
D Denial of service attack
7
What type of attack involves the hacker modifying the source IP address of a
packet in order to try to bypass the security control?
A Spoof attack
B Buffer overflow attack
C Social engineering attack
D Denial of service attack
8
What type of password attack mathematically calculates all possible password
combinations?
A Dictionary
B Hybrid
C Brute force
D Calculated
9
What type of firewall knows about the context of the conversation and
whether the packet is the right packet at that point in time?
A Spoof firewall
B Stateful packet inspection firewall
C Screened firewall
D Packet-filtering firewall
10
Which of the following take corrective action when suspicious activity is
detected? (Select two.)
A Active IDS
B Passive IDS
C IPS
D NAT
Network Security Terminology
22_647486-bk04ch01.indd 47122_647486-bk04ch01.indd 471 10/15/10 11:27 PM10/15/10 11:27 PM