An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

1 Answer

Answer :

(A) Denial of service attack 

Related questions

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : What to do when Milo sits, stares, pounces, stabs and captures?

Last Answer : I’d be happier with a piece of fried chicken but not a dead duck. I guess with all the woods and wildlife here, I cannot prevent this with an outdoor cat, can I?

Description : In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ? (A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps

Last Answer : (C) 1000 bps 

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off

Last Answer : c. To overload a system so it is no longer operational

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The agency that sits between the user and the UNIX system is called the A. logic B. profile C. shell D. erxc E. None of the above

Last Answer : C. shell

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above

Last Answer : B. Auto responder Attack

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : Which of the following control fields in TCP header is used to specify the sender has no more data to transmit? (A) FIN (B) RST (C) SYN (D) PSH

Last Answer : (A) FIN 

Description : The suitable medium to establish commonness between sender and receiver of message

Last Answer : Ans. Communication

Description : Codes must be A. agreed upon in advance between sender and receiver B. eight bit per character C. the same in all modern computer D. either seven or eighth bits per character

Last Answer : A. agreed upon in advance between sender and receiver

Description : The correctness and accuracy of the transmitted message content is A. verified by the modem B. communications system C. determined by the sender and receiver D. ensured by use of digital technique

Last Answer : C. determined by the sender and receiver

Description : ECE Board Exam March 1996 Communications code is ____________. A. eight bits per character B. agreed upon in advance between sender and receiver C. the same in all modern computers D. either seven or eight bits per character

Last Answer : B. agreed upon in advance between sender and receiver

Description : Who should take the most responsibility for clear and effective communication?  A. The Communications Manager B. The sender and the receiver C. The sender D. The receiver

Last Answer : B. The sender and the receiver

Description : Inthe _____ Protocol, the sender sends one frame, stops until it receives confirmation from the receiver, and then sends the next frame. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait

Description : Inthe _____ Protocol, the sender sends its frames oneafter another with noregard to the receiver. A) Stop-and-Wait B) Simplest C) Go-Back-N ARQ D) Selective-Repeat ARQ

Last Answer : Stop-and-Wait B) Simplest

Description : Which of the following statement is False about the efficiency of the given channel? a. If we want to send big packets on the channel, then Stop and Wait is good choice. b. If length ... is directly proportional to efficiency of channel. d. Efficient might be less if capacity of channel is high

Last Answer : Distance between sender and receiver is directly proportional to efficiency of channel.

Description : A sender uses the Stop-and-Wait ARQ protocol for reliable transmission of frames. Frames are of size 1000 bytes and the transmission rate at the sender is 80 Kbps (1Kbps = 1000 bits/second). Size of ... is lost, the sender throughput is __________ bytes/second. a. 2500 b. 2000 c. 1500 d. 500

Last Answer : a. 2500

Description : Which feature of Go Back N ARQ mechanism possesses an ability to assign the sliding window in the forward direction? a. Control Variables b. Sender Sliding Window c. Receiver Sliding Window d. Resending of frames

Last Answer : b. Sender Sliding Window

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which feature of Go-Back-N ARQ mechanism possesses an ability to assign the sliding window in the forward diretion? A. Control Variables B. Sender Sliding Window C. Receiver Sliding Window D. Resending of frames

Last Answer : B. Sender Sliding Window

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : In the communication process, the receiver and sender are classified as A. communication functions B. communication parties C. communication tools D. communication channels

Last Answer : B. communication parties

Description : ____________communication process, receiver and sender are classified as A.functions B.parties C.tools D.channels Answer: B

Last Answer : B.parties

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter

Last Answer : authentication

Description : What are the basic elements of communication? (a) Sender and receiver (b) Message and channel of communication (c) Response and feedback (d) All of the above

Last Answer : (d) All of the above

Description : Communication will be effective if: (a) It is delivered slowly and clearly (b) It is delivered in a calm situation (c) It reaches the receiver completely (d) It reaches the receiver as intended by the sender

Last Answer : d) It reaches the receiver as intended by the sender

Description : In Huffman encoding, both the sender and receiver must have a copy of the code a. Same b. Different c. Generate on Demand d. Both (a) and (b)

Last Answer : a. Same

Description : A person, group, or organisation that has a meaning it intends and attempts to share with a receiver or an audience is a A)medium of transmission. B)source. C)relay channel. D)decoder. E)sender.

Last Answer : B)source.

Description : . ________ is the recording system which enables sender to leave messages for receiver by telephone. (a) E-Mail ; (b) Voice Mail ; (c) Videoconferencing ; (d) Teleconferencing

Last Answer : (b) Voice Mail ;

Description : The process by which a sender transmits content is known as (a) Encoding ; (b) Decoding ; (c) Feedback ; (d) Receiver

Last Answer : (a) Encoding ;

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : What is the simple predicate for: In the back of the shed, sits a mint-condition Model T?

Last Answer : Simple Predicate: sits

Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.

Last Answer : (1) Neither I nor II is correct.

Description : The digital evidences are used to establish a credible link between a) Attacker and victim and the crime scene b) Attacker and the crime scene c) Victim and the crime scene d) Attacker and Information

Last Answer : a) Attacker and victim and the crime scene