1. Which statement describes phone freaking?
Correct Answer is : A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.
2. Which two statements describe access attacks? (Choose two.)
Correct Answer is : Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers.
3. Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN?
Correct Answer is : Packet sniffer
4. 4 What are three goals of a port scan attack? (Choose three.)
Correct Answer is : Determine potential vulnerabilities
5. What is a ping sweep?
Correct Answer is : A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.