Cybersecurity Fundamentals Questions With Complete Solutions
Which two of the following are higher-level protocols that rely upon TCP/IP and are susceptible to attacks such as session hijaking? (choose two) A. ARP B. HTTP C. UDP D. Telnet E. ICMP correct answer: BD Which four of the following are considered the main protocols of the Internet Protocol suite? (choose four) A. UDP B. TCP C. HTTP D. IP E. SSL F. ICMP G. FTP correct answer: ABDF What is the key to the success of an MITM attack? A. The hacked machine becomes overwhelmed with responses. B. TCP/IP bugs make it easy to crash older operating systems. C. The attacker waits until after a communication session is established. D. Packet flooding consumes resources. correct answer: C What information can an attacker use within ICMP to determine what type of OS the device is running?
Written for
- Institution
- Cybersecurity Fundamentals
- Course
- Cybersecurity Fundamentals
Document information
- Uploaded on
- July 8, 2023
- Number of pages
- 22
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cybersecurity fundamentals questions with complete