How does a denial-of-service attack work?
Correct Answer:A
Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.
He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?
Correct Answer:C
John the Ripper is a technical assessment tool used to test the weakness of which of the following?
Correct Answer:A
An attacker attaches a rogue router in a network. He wants to redirect traffic to a LAN attached to his router as part of a man-in-the-middle attack. What measure on behalf of the legitimate admin can mitigate this attack?
Correct Answer:A
Which of the following is an extremely common IDS evasion technique in the web world?
Correct Answer:C