Chapter 2 Practice test 7 of 7 - Review Test Submission Chapter 2 Practice test Tes Chapter 2 t Practice test Question 1 0 out of 0 points The hijacking

Chapter 2 Practice test 7 of 7 - Review Test Submission...

This preview shows page 1 - 3 out of 4 pages.

Review Test Submission: Chapter 2 Practice test   Tes t Chapter 2 Practice test Question 10 out of 0 pointsThe ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network. Selected Answer:b. TCPAnswers:a. FTPb. TCPc. HTTPd. WWW Question 20 out of 0 points____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. Question 3
Image of page 1
0 out of 0 points ____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 4 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture