Question 226
You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.
Question 227
A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
Question 228
Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
Question 229
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
Question 230
Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web
site logging?
site logging?