Chapter 14. Practice Exam 2

Question 1 A _________ is classified as unauthorized discovery and mapping of systems, services, or vulnerabilities on a network.
  • A. Reconnaissance attack

  • B. Access attack

  • C. Denial-of-service attack

Question 2 Which of the following attacks uses a network adapter card in promiscuous mode to capture network traffic?
  • A. Denial of service

  • B. Packet sniffing

  • C. Trojan horse

  • D. Port redirection

Question 3 In which of the following ways can IP spoofing be mitigated? (Choose all that apply.)
  • A. Access control

  • B. RFC 2827 filtering

  • C. Authentication

  • D. Cryptography

Question 4 In which of the following ways can application attacks be implemented? (Choose all that apply.)
  • A. By exploiting protocol weaknesses inherent to an application ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.