Exam 11: Denial-Of-Service Attacks
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
Under what conditions can a flood attack occur?
Free
(Essay)
4.8/5
(43)
Correct Answer:
A flood attack can occur under the following conditions:
* Sending connection requests
* Consuming the bandwidth
* Using your own resources
* Consuming others' resources
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
C
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
A
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.
(Multiple Choice)
4.9/5
(32)
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.
(Multiple Choice)
4.7/5
(27)
______________________________ is a database that maps domain names to IP addresses.
(Short Answer)
4.9/5
(37)
ICMP is used to handle errors and exchange control messages on a network.
(True/False)
4.8/5
(30)
The ____ utility is used to determine if a specific machine located at a specific IP address is online.
(Multiple Choice)
4.7/5
(41)
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
(Short Answer)
4.9/5
(38)
What are the main targets of DoS attacks and what do the attacks accomplish?
(Essay)
4.8/5
(33)
Computers that are connected to the Internet utilize DNS to resolve URLs.
(True/False)
4.9/5
(31)
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
(Short Answer)
4.8/5
(25)
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
(Short Answer)
4.8/5
(35)
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
(Short Answer)
4.9/5
(27)
The process table in UNIX permits a virtually infinite number of entries.
(True/False)
4.9/5
(29)
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
(True/False)
4.7/5
(41)
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
(True/False)
4.8/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)