CHFI - Chapter 7 (Network Forensics) Practice Questions with 100% Verified Solutions
In this type of attack, the attacker sends messages to the computer with an address that indicates the messages are coming from a trusted host. - IP Address Spoofing This is the process of gathering information about a network that may help in an attacking the network. - Enumeration This attack refers to the exploitation of a session-token generation mechanism or token security controls, such that the attacker can establish an unauthorized connection with a target server. - Session Hijacking IN this type of wireless attack, attackers or insiders create a backdoor into a trusted network by installing an unsecured access point inside a firewall - rogue access point attack In this type of attack, the attacker takes advantage of soft access points, which are WLAN radios present in some laptops. The attacker can activate these access points in the victim's system through a malicious program and gain access to the network. - unauthorized association In this type of attack, the attacker carries out the attack using an USB adapter or wireless card. In this method, the host connects with an unsecured station to attack a particular station or evade access point security. - Ad Hoc connection attackIn this type of attack, an attacker sets up unauthorized wireless network using a rogue AP., that has high-power (high gain) antennas and uses the same SSID of the target network. - Honeypot Access Point Attack These tools can be used for carrying out this kind of attack are , SMAC, and Wicontrol. - AP MAC Spoofing Using this technique, the attacker can reconfigure the MAC address in such a way that it appears as an authorized access point to a host on a trusted network. - AP MAC spoofing What is the C in ICMP - Control What is the G in IGMP - Management This layer in the TCP model, allows peer entities on the source and destination devices to carry on a communication and It serves as the backbone for data flow between two devices in a network. - transport This layer in the TCP model handles the movement of data packet over a network, from source to destination. - Internet This layer in the TCP model defines how to use the network to transfer data. It includes protocols such as Frame Relay, SMDS, Fast Ethernet, SLIP, PPP, FDDI, ATM, Ethernet, ARP, etc., which help the machine deliver the desired data to other hosts in the same network. - Network
Escuela, estudio y materia
- Institución
- CHFI - Chapter 7 Practice
- Grado
- CHFI - Chapter 7 Practice
Información del documento
- Subido en
- 27 de marzo de 2024
- Número de páginas
- 12
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
chfi chapter 7 network forensics practice ques