Match each attack type with its description:
Reconnaissance attack
Password attack
Port redirection
Worm, virus, Trojan horse
DoS attack
A. Dictionary-cracking and brute-force attack
B. Uses a compromised host to pass traffic through a firewall that would otherwise be dropped
C. Uses ping sweeps, port scans, and packet sniffers to gain information about a network
D. Floods a network device with traffic in an attempt to render it unusable for legitimate traffic
E. Malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
Reconnaissance attack | Uses ping sweeps, port scans, and packet sniffers to gain information about a network |
Password attack | Dictionary-cracking and brute-force attack |
Port redirection | Uses a compromised host to pass traffic through a firewall that would otherwise be dropped |
Worm, virus, Trojan horse | Malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services |
DoS attack | Floods a network device with traffic in an attempt to render it unusable for legitimate traffic |
Exam with this question: EWAN v4 Chapter 4 Check Your Understanding: Network Security
Please login or Register to submit your answer