Question 46
Which of the following hacking tools provides shell access over ICMP?
Question 47
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP
packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of
attack is Adam attempting to perform?
packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of
attack is Adam attempting to perform?
Question 48
In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?
Question 49
Which of the following statements are true about worms?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 50
Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?