
solves the ACK storm issue and facilitates TCP session hijacking. b) Storm watching c) Packet blocking d) Encryption in view.is any kind of spoofiag where only one side of the relationship under attack is b) IP spoofing c) ARP spoofing d) DNS spoofing 8. In the process to impersonate by performing a of IP spoofing, the hacker needs to anesthetize, or stun, the host that he wants SYN flood (or SYN attack) ARP table modification a) b) c) Packet dropping d) Route table modification 9. Sniffers look only at the traffic passing through the application is resident. on the machine where the a) Memory chips b) network interface adapter c) CPU chips d) Keyboards refers to setting an IDS rule to watch for abnormal increases in network 10. traffic and to alert the security officer when they occur. a) Memory chips b) network interface adapter c) CPU chips d) Keyboards B. True/False (Total 10 points, 2 points per question) Write True or False in the () before each question. 1. Hijacking differs from spoofing in that the takeover occurs during an authenticated 2. The costs to the victims of successful spoofing attacks are tied to the amount of 3. A TCP session can be hijacked only before the hosts have authenticated successfully the contrary, there must be a complete, sustained dialogue between the machines for a minimunm session. information that was copied and the sensitivity of the data. 4. A successful IP spoofing attack requires more than simply forging a single header. On of five packets. 5. A successful hijacking takes place when a hacker intervenes in a TCP conversation and then takes the role of either host or recipient