Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Security fundamentals( Computer Science major) multiple choice question.

ID: 3591830 • Letter: N

Question


Network Security fundamentals( Computer Science major)
multiple choice question. posting more soon.

Öctob Midterm Exam Computer Systems Technologyt D. Deny-of-service attack, is type of attack were a hacker configures their hosts as t intermediary to spoof traffic Denial-of-service attack, is method used by hackers to misdirect traffic E. 12. ICMP flood attack is also referred to as A. IP spoofing attack B. MAC spoofing attack C. Ping attack D. TCP hijacking attack E. Brute Force attack 13. Select the answer that best describes the TCP/IP communication model? Layer, Presentation Layer, Transport Layer, Internet and Data Lin Application Layer, Presentation Layer, Session Layer, Internet and Data Link L E. Application Layer, Presentation Layer, Session Layer, Internet and Data Link la B. Application Layer, Session Layer, Network & Internet and Physical Layer D. Application Layer, Transport Layer, Internet Layer and Network Layer 14. The Packet Filtering Firewall works up to layer of TCP/IP protocol A. Transport Control Protocol B. Internet Protocol C. Boundary Gateway Routing Protocol D. SSH Protocol E. SSL Protocol layer 15. The Stateful Packet Inspection (SPI) Firewall works up to A. User Datagram Protocol B. Internet Protocol C. Transport Control Protocol o. A and C E B and C 16. The Application Level Protection Firewall works up to layer A. Session B. Internet C. Network Presentation E. Application 17. What data packet is transmitted via command Ping send. A. Address Resolution Packet B. Reverse Address Resolution Packet C. User Datagram Packet D. Domain Name Address Resolution Packet E. Internet Control Message Protocol Packet

Explanation / Answer

Answer 12) C. Ping attack
Answer 13) D. Application Layer, Transport Layer, Internet Layer ,Network Layer
Answer 14) A. Transport Control Protocol
Answer 15) E. B and C
Answer 16) E. Application
Answer 17) E. Internet COntrol Message Protocol Packet
Explanation: Ping operates by sending Internet Control Message Protocol (ICMP/ICMP6) Echo Request
packets to the target host and waiting for an ICMP Echo Reply.