Question 26

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?
  • Question 27

    Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.
    Which of the following type of scans would be most accurate and reliable?
  • Question 28

    Which of the following statements are true about a keylogger?
    Each correct answer represents a complete solution. Choose all that apply.
  • Question 29

    Which of the following practices come in the category of denial of service attack?
    Each correct answer represents a complete solution. Choose three.
  • Question 30

    Which of the following is used by attackers to obtain an authenticated connection on a network?