Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Chapter 2 Q&A

1:

What is IP fragmentation offset used for?

A1:

Answer: IP fragmentation offset is used to keep track of the different parts of a datagram. It may be necessary to split larger datagrams as they travel from one router to the next router in a small packet network.

2:

Name the method attackers use to replace the IP address of the sender or, in some rare cases, the destination address with a different IP address.

A2:

Answer: This method is called IP address spoofing.

3:

What is a covert TCP/IP channel?

A3:

Answer: Covert TCP/IP channels are instances in which communication channels are established and data can be secretly passed between two end systems.

4:

The Ping of Death attack is a good example of what type of attack?

A4:

Answer: The Ping of Death attack is a good example of the IP fragmentation attack.

5:

What happens during a buffer overflow?

A5:

Answer: During a buffer overflow, more data is retrieved than can be stored in a buffer location. The additional information must go into an adjacent buffer, resulting in overwriting the valid data held there.

6:

List the two tasks the attacker must perform during a buffer overflow attack.

A6:

Answer:

  • The attacker must place dirty code in the program's code address space.

  • The attacker codes the privileged program so that it jumps to that particular part of the code.

7:

List two spoofing attacks.

A7:

Answer: Two spoofing attacks would be ARP spoofing and DNS spoofing.

8:

During an ARP spoofing attack, does the attacker exploit the hardware address or the IP address of a host?

A8:

Answer: The attacker exploits the hardware address of a host.

9:

List two antispoofing measures for an ARP spoofing attack.

A9:

Answer: Two antispoofing measures for an ARP spoofing attack are ARP server and static ARP.

10:

There are a number of techniques that can be used in a social engineering attack. List three techniques.A10:

Answer: Three social engineering techniques include reverse social engineering, e-mails and phone calls, and authority abuse.


/ 196