Lesson 1 Flashcards

(4 cards)

1
Q

Random Scanning

A

Each compromised computer probes

random addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Permutation Scanning

A

All compromised computers share a
common pseudo-random permutation of the
IP address space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Signpost Scanning

A

Uses the communication patterns of the

compromised computer to find new target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hitlist Scanning

A

A portion of a list of targets is supplied to

a compromised computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly