Which of the following services CANNOT be performed by the nmap utility?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
AB
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
Correct Answer:
C
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
Correct Answer:
B
You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?
Correct Answer:
C
Which of the following statements about smurf is true?
Correct Answer:
B