Question
1. _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's computer, through the attackers computer, and then to
1. _____ modifies MAC addresses in the ARP cache, so that network traffic goes from the victim's computer, through the attacker’s computer, and then to the destination computer.
A. MAC cloning attack
B. ARP DoS attack
C. ARP on-path (person-in-the-middle) attack
D. MAC flooding attack
2.
What is an attack that causes normally available services to be unavailable?
A. DoS
B. MAC flood attack
C. operational technology (OT)
D. on-path (person-in-the-middle)
3. What is a command language interpreter that runs on a command line that is used to interact with Unix and Linux?
A. Bash
B. Macros
C. PowerShell
D. VBA
4. What is a way to bypass a wireless network filter?
A. ARP on-path (person-in-the-middle) attack
B. MAC cloning attack
C. ARP DoS attack
D. MAC flooding attack
5. What are programs in PowerShell?
A. Python
B. VBA
C. Cmdlets
D. Bash
6. What is a 48-bit address used to identify network interface cards? It’s also called “hardware address” or “physical address.”
A. switch
B. MAC
C. ARP
D. DNS
7. What kind of attack is not done on RFID technology?
A. replay attack
B. spoofing
C. DoS
D. IV attack
8. You keep getting unsolicited messages on your Bluetooth devices. What kind of attack is this?
A. rogue AP attack
B. bluejacking
C. jamming attack
D. bluesnarfing
9. Which of the following runs on Windows OS, MacOS, Linux, and Unix?
A. Python
B. Bash
C. Macros
D. PowerShell
10. What is a command-line shell that can be used to manage almost every aspect of the Windows operating system?
A. Macros
B. Python
C. Bash
D. PowerShell
Step by Step Solution
3.43 Rating (156 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below 1C ARP onpath personinthemiddle attack In an ARP onpath personinthemiddle attack the attacker modifies MAC addresses in the ARP cache to in...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started