Datasheet

6
What type of attack involves the hacker sending too much data to the applica-
tion, which normally results in administrative access within a command shell?
A ❍ Spoof attack
B ❍ Buffer overflow attack
C ❍ Social engineering attack
D ❍ Denial of service attack
7
What type of attack involves the hacker modifying the source IP address of a
packet in order to try to bypass the security control?
A ❍ Spoof attack
B ❍ Buffer overflow attack
C ❍ Social engineering attack
D ❍ Denial of service attack
8
What type of password attack mathematically calculates all possible password
combinations?
A ❍ Dictionary
B ❍ Hybrid
C ❍ Brute force
D ❍ Calculated
9
What type of firewall knows about the context of the conversation and
whether the packet is the right packet at that point in time?
A ❍ Spoof firewall
B ❍ Stateful packet inspection firewall
C ❍ Screened firewall
D ❍ Packet-filtering firewall
10
Which of the following take corrective action when suspicious activity is
detected? (Select two.)
A ❑ Active IDS
B ❑ Passive IDS
C ❑ IPS
D ❑ NAT
Network Security Terminology
22_647486-bk04ch01.indd 47122_647486-bk04ch01.indd 471 10/15/10 11:27 PM10/15/10 11:27 PM