Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

CST 16 10 Network Secourity funstanm Denrof-serve, amek, is type of attack were·

ID: 3595604 • Letter: C

Question

CST 16 10 Network Secourity funstanm Denrof-serve, amek, is type of attack were·hacker conheHestheir tots intermediary to E. Denial of-service attach is method used try hackers to miudirest trathe 12. ICMP Rood attack s aiso referred to as spoofing attack A. B. MAC spoofing attack C. Ping attack o. TOP hijacking attack 13. Select the answer that best describes the TCP/IP Communication model? A. Application Layer, Presentation Layer, Transport Layer, Internet and Data Unk lwyer R Application Layer, Session Layer, Network & Internet and Physical Layer C. Application Layer, Presentation Layer, Session Layer, Internet and Data Link Layer D. Application Layer, Transport Layer, internet Layer and N etwork Layer er, Presentation Layer, Session Layer, Internet and Data Link layer 14. The Packet Filtering Firewall works up to laver of TCP/P protocol A. Transport Control Protocol B. Internet Protocol C. Boundary Gateway Routing Protocol D. SSH Protocol E. SSL Protocol layer 15. The Stateful Packet Inspection (SPI) Firewal works up to A. User Datagram Protocol B. Internet Protocol C. Transport Control Protocol D. A and C E. B and C 1 layer. 16. The Application Level Protection Firewall works up to A. Session B. Internet C. Network D. Presentation E. Application 17. What data packet is transmitted via command Ping send. A. Address Resolution Packet B. Reverse Address Resolution Packet C. User Datagram Packet D. Domain Name Address Resolution Packet E. Internet Control Message Protocol Packet

Explanation / Answer

12.Answer: C

A normal denial of servie attack i.e attacker swamps the victim through ICMP echo request packets.it is often utilized as a scrutiny to network packet loss.

13.Answer: D

14.Answer: A

15.Answer: D

16.Answer: E

17.Answer: E