Questions
- Using the
macof -i <interface-name>
command – for example,macof -i eth0
– will influence which of the following?
a) The LAN switch you are connected to
b) The entire LAN in layer 2 only
c) The entire LAN, including switches and routers
d) The entire organization networks
- Ping scans are dangerous for what reason?
a) They load the network.
b) They discover network elements that can be attacked upon discovery
c) They can be used as a DDoS attack.
d) All of the above.
- What is the difference between a SYN scan and a SYN attack?
a) SYN scans and SYN attacks are both used for attacking network resources.
b) A SYN scan discovers network devices while a SYN attack discovers open TCP ports.
c) SYN scans are used to discover open ports while SYN attacks are used to attack network devices.
d) All the these.
- The
hping3 -c 10000 -d 128 -S -w 1024 -p 80 --flood --rand-source 1.2.3.4
command...