![]() Too much information is destined for a particular memory block causing additional memory areas to be affected.Īn access attack tries to gain access to a resource using a hijacked account or other means.An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.Extreme quantities of data are sent to a particular network device interface.Malware is contained in a seemingly legitimate executable program.*.What is a characteristic of a Trojan horse as it relates to network security? by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytesġ6.by sending a large number of TCP SYN packets to a target device from a spoofed source address.by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the same network*.by sending a large number of packets to overflow the allocated buffer memory of the target device. ![]() Explanation: The four phases of worm mitigation are:ĭisinfecting systems is accomplished in the treatment phase and involves terminating the worm process, removing infected files, and patching vulnerabilities exploited by the worm.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |