A. Denial of service
B. Distributed denial of service
C. IP address spoofing
D. Session hijacking
10. Which method would prevent tampering of data in transit?
A. Access control lists (ACLs)
B. Spoofing mitigation
C. SSL
D. Encryption of the data
11. A rouge wireless access point (WAP) is created with the same SSID as the corporate SSID.
The attacker has employees connect to the SSID and watches the information as it’s
relayed to the original SSID. What type of attack is described here?
A. Smurf attack
B. Compromised key attack
C. Sniffer attack
D. Man in the middle attack
12. What can you use to protect against spoofing of internal IP addresses on the perimeter of
your network?
Do'stlaringiz bilan baham: |