![what does mac stand for in information security what does mac stand for in information security](https://www.dnsstuff.com/wp-content/uploads/2019/06/what-does-IDS-do.png)
Locating a host susceptible to a session-hijack attackĮxplanation: Sniffing is usually used to locate the sequence number, which is necessary for a session hijack.Įxplanation: The most common form of session hijacking is the process of taking over a TCP session. Monitoring TCP sessions in order to initiate a session-hijacking attack Analyzing packets in order to locate the sequence number to start a session hijack Gathering packets to locate IP addresses, in order to initiate a session-hijacking attack Which of the following best describes sniffing? Which of the following is the best countermeasure to session hijacking?Įxplanation: Encryption make any information the hacker gathers during a session-hijacking attempt unreadable. Which of the following is a session-hijacking tool that runs on Linux operating systems?Įxplanation: Juggernaut runs on Linux operating systems. Which of the following is essential information to a hacker performing a session-hijacking attack?Įxplanation: In order to perform a session-hijacking attack, the hacker must know the sequence number to use in the next packet so the server will accept the packet. Authentication information isn’t accessible because session hijacking occurs after the user has authenticated. What type of information can be obtained during a session-hijacking attack? (Choose all that apply.)Įxplanation: Passwords, credit card numbers, and other confidential data can be gathered in a session-hijacking attack. A number used in reconstructing UDP sessionĮxplanation: A sequence number indicates where the packet is located in the data steam so the receiving station can reassemble the data. A number that the hacker randomly chooses in order to hijack a session A way of sending information from the sending to the receiving station A number that indicates where a packet falls in the data stream Which of the following tools is only for Sun Solaris systems?Įxplanation: TTYWatcher is used to perform session hijacking on Sun Solaris systems. Execute a Trojan using the hidden sharesĮxplanation: The goal of a Denial of Service attack is to overload a system and cause it to stop responding. What is the goal of a Denial of Service attack? Attempts to break the authentication methodĮxplanation: A Denial of Service attack works by preventing legitimate users from accessing the system. Prevents a legitimate user from using a system or service Cracks passwords, causing the system to crash How does a Denial of Service attack work? Sending TCP packet with the fragment offset out of boundsĮxplanation: The Ping of Death attack sends packets that, when reassembled, are too large and cause the system to crash or lock up.
![what does mac stand for in information security what does mac stand for in information security](https://www.rollingstone.com/wp-content/uploads/2020/11/Oakywood-Vertical-laptop-stand.jpg)
Sending packets very quickly to fill up the receiving buffer Sending very large packets that cause a buffer overflow Sending packets that, when reassembled, are too large for the system to understand