Which type of attack occurs when a hacker obtains passwords and other information from legitimate transactions?
What common target can be reconfigured to disable an interface and provide inaccurate IP addresses over the Internet?
Which of the following is a way to get around a firewall to intrude into a secure network from a remote location?
What is the final step in assessing the risk of network intrusion from an internal or external source?
Which type of attack uses a simple or complex program that self-replicates and/or deposits a payload on a remote or local computer?
Which type of attack can use a worm or packet sniffer to crash systems, causing low resources and/or consuming bandwidth?