250+ Understanding Attack Vectors part-12

Que.There are __________ types of sniffing.
a. 2
b. 3
c. 4
d. 5
Que.Active sniffing is difficult to detect.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Which of the following is not a sniffing tool?
a. Wireshark
b. Dude Sniffer
c. Maltego
d. Look@LAN
Que.A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
a. True
b. False
c. May be True or False
d. Can’t say
Que.A ______________ on the whole turns your system’s NIC to the licentious mode so that it can listen to all your data transmitted on its division.
a. Phishing site
b. Sniffer tool
c. Password cracker
d. NIC cracker
Que.In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.
a. passive
b. signal
c. network
d. active
Que.__________________ are those devices which can be plugged into your network at the hardware level & it can monitor traffic.
a. Hardware sniffers & analyzers
b. Hardware protocol analyzers
c. Hardware protocol sniffers
d. Hardware traffic sniffers and observers
Que._____________ attack is the exploitation of the web-session & its mechanism that is usually managed with a session token.
a. Session Hacking
b. Session Hijacking
c. Session Cracking
d. Session Compromising
Que.The most commonly used session hijacking attack is the _______________
a. IP hacking
b. IP spooling
c. IP spoofing
d. IP tracking
Que.________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.
a. Internet
b. Network
c. Hijacking
d. Sessions