You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?
Which of the following IP packet elements is responsible for authentication while using IPSec?
Which of the following are the limitations for the cross site request forgery (CSRF) attack?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?