"Do I Know This Already?" Quiz
The purpose of the "Do I Know This Already?" quiz is to help you decide if you really need to read the entire chapter. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.The 10-question quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.
1: | Ping is a reliable ICMP echo scan. What is another reliable type of scan that can be used to enumerate hosts on a target network?
|
2: | What TCP bit must be set to allow packets to pass through a router's access control list?
|
3: | Which of the following are examples of DDoS attack tools?
|
4: | DDoS attacks are based on a two-tier model of systems. What are the two types of systems involved in a DDoS attack called?
|
5: | Unauthorized access attacks can be conducted over what applications?
|
6: | What does an attacker gain by using application layer attacks?
|
7: | Which of the following are application layer attacks?
|
8: | Which of the following attacks is related to a buffer overflow?
|
9: | Which services on UNIX hosts do trust exploitation attacks typically involve?
|
10: | How do trust exploitation attacks work?
|