CST 16 10 Network Secourity funstanm Denrof-serve, amek, is type of attack were·
ID: 3595603 • Letter: C
Question
CST 16 10 Network Secourity funstanm Denrof-serve, amek, is type of attack were·hacker conheHestheir tots intermediary to E. Denial of-service attach is method used try hackers to miudirest trathe 12. ICMP Rood attack s aiso referred to as spoofing attack A. B. MAC spoofing attack C. Ping attack o. TOP hijacking attack 13. Select the answer that best describes the TCP/IP Communication model? A. Application Layer, Presentation Layer, Transport Layer, Internet and Data Unk lwyer R Application Layer, Session Layer, Network & Internet and Physical Layer C. Application Layer, Presentation Layer, Session Layer, Internet and Data Link Layer D. Application Layer, Transport Layer, internet Layer and N etwork Layer er, Presentation Layer, Session Layer, Internet and Data Link layer 14. The Packet Filtering Firewall works up to laver of TCP/P protocol A. Transport Control Protocol B. Internet Protocol C. Boundary Gateway Routing Protocol D. SSH Protocol E. SSL Protocol layer 15. The Stateful Packet Inspection (SPI) Firewal works up to A. User Datagram Protocol B. Internet Protocol C. Transport Control Protocol D. A and C E. B and C 1 layer. 16. The Application Level Protection Firewall works up to A. Session B. Internet C. Network D. Presentation E. Application 17. What data packet is transmitted via command Ping send. A. Address Resolution Packet B. Reverse Address Resolution Packet C. User Datagram Packet D. Domain Name Address Resolution Packet E. Internet Control Message Protocol PacketExplanation / Answer
Answer is as follows:
1) ICAMP flood Attack alsp reffered to Ping Attack
2) The TCP/IP layer has only 4 layers so the correct option is D because only D has 4 parts others have 5 parts.
Application,Transport,Internet,Network layer.
3) It works up to Transport Layer which has transport control protocol so the answer is A.
4) The SPI keeps track of network connections such TCP and UDP Stream So, it works for both User Datagram Protocol and Transfer control protocol then the answer is D i.e. A and C both.
5) It Operates on the application layer of protocol stack and application is last layer of protocol stack so it works upto application layer. Answer is E
6) Ping Command operates by Internet Control Message Protocol so answer id E i.e.Internet Control Message Protocol Packet is transmitter via command ping.
if there is any query please ask in comments...