Computer Networking Certified Practitioner
Comprehensive Resource To Help You Ace 2026-2027
Includes Frequently Tested Questions With
ELABORATED 100% Correct COMPLETE SOLUTIONS
Guaranteed Pass First Attempt!!
Current Update!!
1. MetaFisher
(Malcode Payloads) - ANSWER -well-known code that's often used for MITM
attacks
-installs a browser help object, or BHO, within Internet Explorer
-BHO enables an attacker to redirect users to specifically designed phishing pages
-BHO also enables attackers to add HTML to a site
2. Types of DoS Attacks
(Malcode Payloads) - ANSWER -TCP SYN
- UDP
-ICMP Flood
-ICMP Nuke
-Smurf (ICMP Echo)
-Fraggle (UDP Echo)
-LAND
,Local Area Network Denial (LAND)
3. (Malcode Payloads) - ANSWER -involve sending modified data packets to
targets, causing the targets to reply to themselves continuously.
-attacker spoofs the target's IP address and sends a TCP SYN data packet to an
open port on the target, listing the target's own IP address as both the source and
destination.
4. Push-ack attacks
(Malcode Payloads) - ANSWER - target is forced to load each packet's data in a
buffer, and send an acknowledgement only once the process is completed.
-Targets can't always handle the high volume of packets that attackers send, and
may crash.
5. Teardrop attacks
(Malcode Payloads) - ANSWER - sends oversize, fragmented IP payloads to a
target, causing it to crash
-Attackers forge the data in each payload's IP header so they contain overlapping
data
6. Naptha attacks
(Malcode Payloads) - ANSWER -capitalize on the way TCP/IP stacks and
network applications handle TCP connections
- leave TCP connections open and in varied states so that the target becomes
overwhelmed by the traffic
,7. Ping of death attacks
(Malcode Payloads) - ANSWER -an ICMP ECHO request exceeding 65 535 bytes
is sent to the target.
8. Recursive HTTP attacks(Malcode Payloads) - ANSWER -target web servers
with the intention of depleting their resources
-often performed on dynamic sites, on which attackers can identify slow-loading
pages
9. Echo attacks/Chargen attacks
(Malcode Payloads) - ANSWER -use packets that are spoofed with the target's
address and seem as though they're from the target's ECHO service too
-echo service repeats whatever is sent to it
10. DNS recursion attacks
(Malcode Payloads) - ANSWER - use a victim's address to send a query
-responds to the victim's address instead of the attacker's.
11. Network layer and Application Layer
(Infection Identification) - ANSWER What two layers should security solutions
focus on?
12. Application Layer Solutions
, (Infection Identification) - ANSWER Antivirus software
Heuristics
HIDS
13. Suspicious Activity
(Infection Identification) - ANSWER -Pop-ups
-Deteriorated -performance
-Modified HOSTS files
-DNS changes
14. Processes, Windows registry, Common file locations
(Infection Identification) - ANSWER What should you inspect when checking
for infection?
15. Advanced persistent threats
(Infection Identification) - ANSWER -attacker's primary goal is to gain access to
a network and to maintain that access point for as long as possible
-mimic legitimate traffic, and are difficult to identify
Prevent/Detect APT's
(Infection Identification) - ANSWER -Educate users and control access
-Use reputation ranking
-Pay attention to outgoing traffic