1: | What is IP fragmentation offset used for? |
2: | Name the method attackers use to replace the IP address of the sender or, in some rare cases, the destination address with a different IP address. |
3: | What is a covert TCP/IP channel? |
4: | The Ping of Death attack is a good example of what type of attack? |
5: | What happens during a buffer overflow? |
6: | List the two tasks the attacker must perform during a buffer overflow attack. |
7: | List two spoofing attacks. |
8: | During an ARP spoofing attack, does the attacker exploit the hardware address or the IP address of a host? |
9: | List two antispoofing measures for an ARP spoofing attack. |
10: | There are a number of techniques that can be used in a social engineering attack. List three techniques. |