Exam 4: Denial of Service Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ping -l option changes the size of the packet you can send.

Free
(True/False)
4.7/5
(26)
Correct Answer:
Verified

True

A firewall can be configured to disallow certain types of incoming traffic that may be attacking.

Free
(True/False)
4.9/5
(29)
Correct Answer:
Verified

True

One classic denial-of-service attack distributed by email was _____________.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

A denial-of-service attack is one of the most common attacks on a system.

(True/False)
4.8/5
(40)

The command-line command to instruct the ping utility to send packets until explicitly told to stop is ping ____.

(Multiple Choice)
4.8/5
(34)

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n)________ attack.

(Multiple Choice)
4.8/5
(37)

The command-line command to display all options for the ping command is ping ____.

(Multiple Choice)
4.8/5
(33)

One defense against denial-of-service attacks is to _______ ICMP packets.

(Multiple Choice)
4.8/5
(29)

An echo-chargen attack occurs when the attacker sends a forged packet with the same source IP address and destination IP address as the target's IP address.

(True/False)
4.7/5
(28)

The attack in which the attacker sends a packet that is too large and can shut down a target machine is a(n)________________ attack.

(Multiple Choice)
4.8/5
(31)

A teardrop attack involves sending a forged packet to the victim.

(True/False)
4.8/5
(36)

One tool used for a denial-of-service attack is ______________.

(Multiple Choice)
4.8/5
(32)

Which defensive technique involves the server sending a wrong SYN+ACK to the client,so the client sends and RST packet notifying the server of an error? This makes the server think the client request is legitimate.

(Multiple Choice)
4.9/5
(36)

SYN cookies are a form of attack.

(True/False)
4.9/5
(27)

Which type of attack attempts to overload the system with requests,denying legitimate users access?

(Multiple Choice)
4.8/5
(36)

The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself is a(n)_______________ attack.

(Multiple Choice)
4.9/5
(40)

_________ attacks are becoming less common in modern operating systems.

(Multiple Choice)
4.7/5
(36)

Which defensive technique involves altering the TCP stack on the server so that it will take less time to timeout when a SYN connection is left incomplete?

(Multiple Choice)
4.8/5
(30)

Which attack involves sending an ICMP packet to the broadcast address so that it is then sent to the spoofed source address,causing the network to perform a DoS attack on one of more of its member servers?

(Multiple Choice)
4.8/5
(33)

A smurf attack is a type of malware attack.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)