Which sniffer tool is designed to intercept and reveal


Assignment

Question 1
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?
A.Wireshark B.Nemesis C.Etherape D.Cain

Question 2
Which sniffer tool is designed to intercept and reveal passwords?
A.Windump B.Dsniff C.Wireshark D.All of the above

Question 3
Which of the following is a tool used for sniffing?
A.Hunt B.Tcpdump C.Nemesis D.SMAC

Question 4
Sniffing can be used to ___________.
A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above

Question 5
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel

Question 6
Which of the following attacks sends out bogus requests to any requesting device and the switch?
A.Spoofing B.Flooding C.Poisoning D.Hijacking

Question 7
Which of the following protocols is not easily sniffed?
A.SMTP B.HTTP C.SSH D.Telnet

Question 8
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?
A.Sniffing B.Hijacking C.Denial of service D.Covert channel

Question 9
Which of the following takes place on networks such as those that have a hub as the connectivity device?
A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing

Question 10
Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash?
A.Fraggle B.Smurf C.Land D.Teardrop

Question 11
Who originally designed and created Linux?
A.Bill Gates B.Linus Torvalds
C.Steve Jobs D.Joseph Linux

Question 12
Which of the following is an application-level scanner?
A.Flawfinder B.SARA C.VLAD D.Nikto Simple

Question 13
Which of the following is an early Linux firewall technology that controls traffic by checking packets?
A.ipchains B.iptables C.ipconfig D.ip host

Question 14
In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued?
A.dir/p B.ls -l C.cp -v D.rm -al

Question 15
Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?
A./dev B./etc C./bin D./var

Question 16
Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?
A./dev B./etc C./bin D./var

Question 17
Most versions of Linux make their source code available through which of the following methods?
A.General Public License (GPL)?B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE)?D.UNIX

Question 18
The core component of every operating system is which of the following?
A.Kernel B.Shell?C.User interface D.BIOS

Question 19
In Linux, which of the following correctly denotes a hard drive in a machine?
A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/

Question 20
Approximately how many distributions of Linux are available in different forms and formats?
A.100 B.200 C.1,000 D.2,000.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Which sniffer tool is designed to intercept and reveal
Reference No:- TGS02402648

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)