100%(6)6 out of 6 people found this document helpful
This preview shows page 1 - 3 out of 4 pages.
Review Test Submission: Chapter 2 Practice testTestChapter 2 Practice testQuestion 10 out of 0 pointsThe ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.Selected Answer:b. TCPAnswers:a. FTPb. TCPc. HTTPd. WWWQuestion 20 out of 0 points____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated.Question 3
0 out of 0 points____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.