Briefly describe RIP attacks.
What will be an ideal response?
RIP attacks take advantage of RIP, or Routing Information Protocol. This information protocol is an essential component in a TCP/IP network and is responsible for distribution of routing information within networks.?A RIP packet is often used without verification. Attacks on RIP change the destination of data. An attacker can change the routing table on routers and specify that the route through the hacker's designated collection node is the fastest route for packets to or from a sensitive machine. Once the router is modified, it transmits all of the packets to the hacker computer. They can then be modified, read, or responded to.
You might also like to view...
ASCII is able to encode a total of ____ different symbols.
A. 64 B. 256 C. 512 D. 65,536
In data flow diagrams (DFD), systems analysts call an entity that supplies data to the system a sink.
Answer the following statement true (T) or false (F)
Which of the following would confirm that you have a DNS problem?
A. Ping returns a "request timed out" message. B. Ping does not work with either an IP address or a Web site address. C. Ping works with the IP address but not with the Web site name. D. The DNS resolver cache is empty.
jQuery is a library that
a. consists of methods that are written with Java b. is automatically loaded with a web page c. consists of methods that are written with JavaScript d. can be loaded into a web page from a JavaScript Delivery Network