You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?
Correct Answer:C
Which of the following tools can be used to detect the steganography?
Correct Answer:A
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BCD
Which of the following types of attacks come under the category of hacker attacks?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:BD
Which of the following malicious software travels across computer networks without the assistance of a user?
Correct Answer:A