What common target can be reconfigured to disable an interface and provide inaccurate IP addresses over the Internet?
Which of the following is a way to get around a firewall to intrude into a secure network from a remote location?
What is the final step in assessing the risk of network intrusion from an internal or external source?
Which type of attack uses a simple or complex program that self-replicates and/or deposits a payload on a remote or local computer?
Which type of attack can use a worm or packet sniffer to crash systems, causing low resources and/or consuming bandwidth?