Question 226

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.
  • Question 227

    A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
  • Question 228

    Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
  • Question 229

    Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
  • Question 230

    Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web
    site logging?