Question 1. A _____ is a software or hardware device used to observe traffic as it passes through a network on shared broadcast media.
- logic bomb
- network sniffer
- backdoor
- trapdoor
Question 2. In a _____ attack, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all the systems on that network.
- smurf
- denial-of-service
- viral
- worm
Question 3. The art of "secret writing" is called _____.
- spoofing
- smurfing
- cryptography
- cryptanalysis
Question 4. Securing e-mail is something that must be done by _____.
- networking administrators
- security administrators
- outlook express
- users
Question 5. A worm is a type of virus that _____.
- is scripted to send itself to other systems
- is designed to crawl in under a firewall
- buries itself between the kernel and the Application Layer of the operating system
- is passed through e-mails with a subject heading that has the word "worm" in it