Rajarshi School Of Management & Technology**We aren't endorsed by this school
Course
COMPUTER E CS3110B
Subject
Information Systems
Date
Dec 28, 2024
Pages
1
Uploaded by CorporalRiverGrasshopper20
MitM and Password Attacks11.Man-in-the-middle attacks include:a) IP spoofingb) Session hijackingc) Replay attacksd) All of the aboveAnswer:d12.What is the purpose of IP spoofing?a) To monitor network activityb) To gain unauthorized access by forging an IP addressc) To overload network systemsd) To modify configuration filesAnswer:b13.A dictionary attack uses:a) Random combinations of letters and numbersb) Precompiled lists of common passwordsc) Malware scripts in softwared) Phishing techniquesAnswer:b14.Pass-the-hash attacks exploit:a) Password databasesb) Encrypted hashes of passwordsc) Network protocol vulnerabilitiesd) User session informationAnswer:b15.Replay attacks can be mitigated by:a) Using encryption keysb) Adding timestamps to communicationsc) Securing network switchesd) Enforcing access control policiesAnswer:b