Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources.
What is the attack technique used by Jude for finding loopholes in the above scenario?
UDP flood attack
Ping-of-death attack
Spoofed session flood attack
Peer-to-peer attack
Correct answer: C
Question 2
Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?
Reverse engineering
App sandboxing
Jailbreaking
Social engineering
Correct answer: A
Question 3
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?