1. Following are the art of packet crafting, except ______________.
A) Packet Assembly
B) Packet Inspection
C) Packet Decoding
D) Packet Editing
2. Which of the following is not an advantage of Packet Inspection?
A) It does not support strong user authentication
B) Filter and analyze messages
C) Open and close ports
D) Perform in-line spam screening
3. Select the technique used to identify the information of operating system running on a target machine.
A) Eavesdropping
B) Decompilation
C) Debugging
D) OS Fingerprinting
4. Which of the following statement is a technique of encrypting a clear text data into a scrambled code?
A) Cryptography
B) Symmetric Cryptography
C) Asymmetric Cryptography
D) None of the above
5. The act of intercepting communication among two points is called ________.
A) Decompilation
B) Eavesdropping
C) Debugging
D) None of the above