Question 191

Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?
  • Question 192

    Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
  • Question 193

    You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?
  • Question 194

    You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to
    accomplish the task?
  • Question 195

    Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?