Chapter 9 Review - Chapter 9 - TCP/IP Security Review...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 9 - TCP/IP Security Review Review of attempt 2 Started on Tuesday, July 19, 2011, 03:27 AM Completed on Tuesday, July 19, 2011, 03:33 AM Time taken 5 mins 29 secs Marks 14/15 Grade 93 out of a maximum of 100 ( 93 %) Question 1 Marks: 9 Match each item with a statement below. Permits would-be malefactors to identify potential targets for attacks. One kind of IP service that is vulnerable to attack Sends ICMP Echo Request packets to a range of IP addresses to determine which hosts are active. An examination of any traces of attack. Masquerades as innocuous or built-to-purpose programs. Can be used to look inside suspect files without launching them. An example of a Trojan horse program. Permits two parties to exchange sensitive information securely by using digital certificates to prove identities for both parties. Computer system deliberately setup to entice and trap attackers. Partially correct Marks for this submission: 8/9.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Chapter 9 Review - Chapter 9 - TCP/IP Security Review...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online