Exam 4: Denial of Service Attacks
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
The ping -l option changes the size of the packet you can send.
Free
(True/False)
4.7/5
(26)
Correct Answer:
True
A firewall can be configured to disallow certain types of incoming traffic that may be attacking.
Free
(True/False)
4.9/5
(29)
Correct Answer:
True
One classic denial-of-service attack distributed by email was _____________.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
A denial-of-service attack is one of the most common attacks on a system.
(True/False)
4.8/5
(40)
The command-line command to instruct the ping utility to send packets until explicitly told to stop is ping ____.
(Multiple Choice)
4.8/5
(34)
The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n)________ attack.
(Multiple Choice)
4.8/5
(37)
The command-line command to display all options for the ping command is ping ____.
(Multiple Choice)
4.8/5
(33)
One defense against denial-of-service attacks is to _______ ICMP packets.
(Multiple Choice)
4.8/5
(29)
An echo-chargen attack occurs when the attacker sends a forged packet with the same source IP address and destination IP address as the target's IP address.
(True/False)
4.7/5
(28)
The attack in which the attacker sends a packet that is too large and can shut down a target machine is a(n)________________ attack.
(Multiple Choice)
4.8/5
(31)
A teardrop attack involves sending a forged packet to the victim.
(True/False)
4.8/5
(36)
One tool used for a denial-of-service attack is ______________.
(Multiple Choice)
4.8/5
(32)
Which defensive technique involves the server sending a wrong SYN+ACK to the client,so the client sends and RST packet notifying the server of an error? This makes the server think the client request is legitimate.
(Multiple Choice)
4.9/5
(36)
Which type of attack attempts to overload the system with requests,denying legitimate users access?
(Multiple Choice)
4.8/5
(36)
The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n)_______________ attack.
(Multiple Choice)
4.9/5
(40)
_________ attacks are becoming less common in modern operating systems.
(Multiple Choice)
4.7/5
(36)
Which defensive technique involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete?
(Multiple Choice)
4.8/5
(30)
Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address,causing the network to perform a DoS attack on one of more of its member servers?
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)