Question
Fill in the blank. 1. [____] relies on IP but does not guarantee delivery or use handshaking. 2. In order to sniff a network, the
Fill in the blank.
1. [____] relies on IP but does not guarantee delivery or use handshaking.
2. In order to sniff a network, the user need to be a [____] user.
3. Assuming Transport Layer Security (TLS) is not used, credentials transmitted via [____] are sent in plaintext as part of the protocol. (that is, provide a protocol).
4. HTTP Basic Authentication (BA) provides no confidentiality protection for the transmitted credentials as they are merely encoded with [____] in transit.
5. On a/an [____] network, data are sent to all of the network's machines.
6. In an unswitched network, machines ignore packets that are not addressed to them. As such, by using a network interface in [____], it is possible to monitor all of the traffic passing through a network adapter.
7. TCP NULL, FIN, and Xmas scans are examples of [____] types of scans since no TCP sessions are created for any of these scans. (HINT: the word I'm looking for is not TCP)
8. TCP NULL, FIN, and Xmas scans work by returning a packet with [____] if the port is closed and no response at all if the port is open.
9. When running a decoy scan on a target via Nmap, you should use real IP addresses or else you might accidentally [____] your target.
10. For targets, [____] is a technique used to resist SYN flood attacks.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started