All of the above
They route traffic based upon inspecting packets.
They filter traffic based upon inspecting packets.
They switch packets based upon inspecting packets.
They forward packets to the Internet based upon inspecting packets.
The MAC address doesn’t map to a manufacturer.
The MAC address is two digits too long.
A reverse ARP request maps to two hosts.
The host is receiving its own traffic.
Capture all traffic on the network
Entice the victim to open or activate the payload
Install software to perform any function
Jumping-off point for future attacks
Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.
Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached
Router C will use ICMP to inform Router B that Host 2 cannot be reached
Router C will send a Destination Unreachable message type
The sender encrypts the data using the sender's private key, and the receiver decrypts the data using the sender's public key.
The sender encrypts the data using the sender's public key, and the receiver decrypts the data using the sender's private key.
The sender encrypts the data using the receiver's public key, and the receiver decrypts the data using the receiver's private key.
The sender encrypts the data using the receiver's private key, and the receiver decrypts the data using the sender's public key.
Mask a network
Identify clients to the network
Identify the network to clients or potential clients
Christmas tree scan
Return On Investment (ROI)
S-1-5- and end with -500
Passive information gathering
Analysis of host scanning
Network level discovery
Security scanners are not designed to scan through a firewall.
Security scanners cannot perform vulnerability mapping.
Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.
All of the above.
You load a dictionary of words into your cracking program.
You create a rainbow table from a dictionary and compare it with hashed passwords
You attempt every single possibility until you exhaust all possible combinations or discover the password
You threaten someone with physical harm unless they reveal their password
Keeping track of Ethernet/IP addressing pairing
DNS cache poisoning
DNS zone transfer