2 Question What can be deployed to intercept and log network traffic passing through the network? protocol analyzers NIPSs proxy catchers event viewers NIDSs Correct 2 of 5 3 Question What attack involves impersonating another device? Spoofing Spearing Spimming Pharming Phishing Correct 3 of 5 4 Question Packet sniffing can be helpful in detecting rogues. False True Correct 4 of 5 5 Question Which of the following is NOT a means used by an attacker to do reconnaissance on a network? DNS footprinting Smurf attack TCP/IP Stack fingerprinting Port scan attack Banner grabbing Christmas tree attack Correct What is a session token? another name for a third-party cookie a unique identifier that includes the user's email address XML code used in an XML injection attack a random string assigned by a web server CORRECT Which attack uses the user's web browser settings to impersonate that user? Session hijacking XDD XSRF Domain hijacking COR...