WITH COMPLETE SOLUTIONS!!
1 of 138
Term
What are the types of spoofing?
Give this one a try later!
blind spoofing
impersonation
active spoofing
bribery
IP spoofing
deception
ARP
, conformity
Web spoofing
reverse social engineering
DNS
buffer overflows
supports DRAM-MD5, which is
tries to make connections with
good, but it can allow unauthorized
all TCP remote ports
access
firewalls or filters can protect the
server from attacks
Don't know?
2 of 138
Term
What are some vulnerabilities in the C and C++ languages? 3
Give this one a try later!
Master terminal
remote terminal
ensures safe use of radioactive
items for non-military purposes
human/machine interface
communication
, buffer overflows
buffer over-runs
supports DRAM-MD5, which is
good, but it can allow unauthorized
failure to handle errors
access
improper file access
firewalls or filters can protect the
Don't knows?erver from attacks
3 of 138
Term
What is configuration management for control systems?
Give this one a try later!
documenting and monitoring documenting and monitoring
systems to make sure they have a systems to make sure they
bad configuration. have a good configuration.
ignoring system creating new configurations without
configurations completely. any documentation.
Don't know?
, 4 of 138
Term
What does the proxy server do?
Give this one a try later!
restricts users from accessing some websites
masks IP of users PC from outside connections
maintains cache of sites users have visited
examines UDP ports
sends 0-byte packet to all ports
FIN_WAIT: waits for fin packet - 10mins
TIME_WAIT: packets to arrive to destination computer - 2 mins KEEP_ALIVE:
see if destination computer is still active.
sends IP packets to each protocol on the target host
if ICMP unreachable is sent back, then target does not use that protocol.
Don't know?
5 of 138