1:
| What is IP fragmentation offset used for? |
A1:
| Answer: IP fragmentation offset is used to keep track of the different parts of a datagram. It may be necessary to split larger datagrams as they travel from one router to the next router in a small packet network. |
2:
| Name the method attackers use to replace the IP address of the sender or, in some rare cases, the destination address with a different IP address. |
A2:
| Answer: This method is called IP address spoofing. |
3:
| What is a covert TCP/IP channel? |
A3:
| Answer: Covert TCP/IP channels are instances in which communication channels are established and data can be secretly passed between two end systems. |
4:
| The Ping of Death attack is a good example of what type of attack? |
A4:
| Answer: The Ping of Death attack is a good example of the IP fragmentation attack. |
5:
| What happens during a buffer overflow? |
A5:
| Answer: During a buffer overflow, more data is retrieved than can be stored in a buffer location. The additional information must go into an adjacent buffer, resulting in overwriting the valid data held there. |
6:
| List the two tasks the attacker must perform during a buffer overflow attack. |
A6:
| Answer:- The attacker must place dirty code in the program's code address space.
- The attacker codes the privileged program so that it jumps to that particular part of the code.
|
7:
| List two spoofing attacks. |
A7:
| Answer: Two spoofing attacks would be ARP spoofing and DNS spoofing. |
8:
| During an ARP spoofing attack, does the attacker exploit the hardware address or the IP address of a host? |
A8:
| Answer: The attacker exploits the hardware address of a host. |
9:
| List two antispoofing measures for an ARP spoofing attack. |
A9:
| Answer: Two antispoofing measures for an ARP spoofing attack are ARP server and static ARP. |
10:
| There are a number of techniques that can be used in a social engineering attack. List three techniques.A10:
| Answer: Three social engineering techniques include reverse social engineering, e-mails and phone calls, and authority abuse. |