CCNA Discovery Chapter 8 : Networking for Home and Small Businesses (Version 4.0)

1
Identify three techniques used in social engineering. (Choose three.)
#vishing
#phishing
#pretexting

2
A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?
#SYN flooding

CCNA Discovery Chapter 1: Networking for Home and Small Businesses (Version 4.0)


1   
Which adapter enables a computer system to exchange information with other systems on a local network?
    #network interface card

2   
What measurement is commonly associated with computer processing speed?
    #hertz

Related Posts Plugin for WordPress, Blogger...