This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Chapter 7: Spoofing
1. What is spoofing?
2. What is IP spoofing?
3. What is the difference between active spoofing and blind spoofing?
4. Can ARP spoofing be accomplished if the target computer is a Mac running OS X?
5. Is it common to use “phishing” e-mails to entice a victim to a DNS spoof site?
6. Can you use Ethereal to send spoofed IP packets?
7. Does Ethereal run on Mac computers?
8. What is a static ARP table and what is the disadvantage of using one?
9. What do you do with this formula?
128,000
2
RTT
Indicate whether the sentence or statement is true or false.
10. _______ Apsend, Ettercap, and Arpspoof are three common spoofing tools.
11. _______ Ettercap works on any Windows machine.
12. Mausezahn is a common spoofing tool that works on Windows platforms. True or False?
13. _______ Arpspoof, part of the dsniff suite, can be used to spoof MAC tables.
14. _______ Authentication and trust have an inverse relationship.
Match these types of spoofing with their definitions below.
a. IP d. Active
b. Web spoofing e. Domain Name System (DNS)
c. Blind f. Address Resolution Protocol (ARP)
15. _______ Spoofing where only one side of the relationship under attack is in view.
16. _______ The hacker can see both parties and is in a position to observe the responses from the
target computer.
17. _______ The hacker changes the IP address assigned to a Web site to the IP address of the
hacker’s computer.
18. _______ Spoofing that consists of a hacker accessing a target disguised as a trusted third party.
19. _______ Modifying the ARP table for hacking purposes.
20. _______ A hacker spoofs an IP address through a Web site. Phishing e-mails and fraudulent ads
draw the victim to the spoofed site.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.