How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Steve Herrod Your Own Question

Steve Herrod
Steve Herrod, Masters Degree
Category: Homework
Satisfied Customers: 3288
Experience:  BA (Hons) & MA Qualifications
65126503
Type Your Homework Question Here...
Steve Herrod is online now
A new question is answered every 9 seconds

Network Security

This answer was rated:

"For Steve Herrod only"


 


Are you available now?  It is six multiple choice questions.  Thanks! 


 


Steve Herrod :

Hey - yes should be able to help

Steve Herrod :

let me know the details

Customer:

Are you ready to begin?

Steve Herrod :

yep

Steve Herrod :

is it timed?

Customer:

yes, one hour.

Steve Herrod :

no problem

Customer:

it is six questions

Steve Herrod :

cool

Customer:

1. (TCO 1) The agents used in a distributed denial of service attack are called _____. (Points : 4) zombies vampires werewolves Smurfs















Question 2. 2. (TCO 1) When an attacker monitors traffic between a sender and receiver, this is called a(n) _____ attack. (Points : 4)

active monitoring packet capture intrusion man-in-the-middle
















Question 3. 3. (TCO 1) How would you describe IP spoofing? (Points : 4)

Altering the source IP address in packets Sending large amounts of ICMP packets to a broadcast address Altering IP routing tables Packet sniffing
















Question 4. 4. (TCO 1) The _____ attack method uses the target IP address as both a source and destination to confuse the destination host or router. (Points : 4)

Ping of Death SYN flood Smurf land.c
















Question 5. 5. (TCO 1) The component of network security that ensures that authorized users have access to data and network resources is _____. (Points : 4)

data integrity data confidentiality data and system availability data and user authentication
















Question 6. 6. (TCO 1) An external menace to a system or its design is called a(n) _____. (Points : 4)

vulnerability threat risk exploit


Steve Herrod :

got them

Customer:

Thanks.

Steve Herrod :

no problem

Steve Herrod :

here you go

Customer:

Thanks, XXXXX XXXXX are you going to be available tomorrow? That will also be six multiple choice questions in networking security.

Steve Herrod :

anytime after 2PM EST

Customer:

What about 4:30pm?

Customer:

EST

Customer:

I will be available around that time.

Steve Herrod :

yep, no problem

Customer:

See you then. I will go ahead and finish the process.

Steve Herrod :

thanks

Steve Herrod and 2 other Homework Specialists are ready to help you

Related Homework Questions