Exam 11: Denial-Of-Service Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Under what conditions can a flood attack occur?

Free
(Essay)
4.8/5
(43)
Correct Answer:
Verified

A flood attack can occur under the following conditions:
* Sending connection requests
* Consuming the bandwidth
* Using your own resources
* Consuming others' resources

____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

C

____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
Verified

A

In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.

(Multiple Choice)
4.9/5
(32)

A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.

(Multiple Choice)
4.7/5
(27)

______________________________ is a database that maps domain names to IP addresses.

(Short Answer)
4.9/5
(37)

ICMP is used to handle errors and exchange control messages on a network.

(True/False)
4.8/5
(30)

The ____ utility is used to determine if a specific machine located at a specific IP address is online.

(Multiple Choice)
4.7/5
(41)

A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.

(Short Answer)
4.9/5
(38)

What are the main targets of DoS attacks and what do the attacks accomplish?

(Essay)
4.8/5
(33)

Computers that are connected to the Internet utilize DNS to resolve URLs.

(True/False)
4.9/5
(31)

____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.

(Short Answer)
4.8/5
(25)

Describe an example of a voluntary DoS attack.

(Essay)
4.8/5
(44)

____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.

(Short Answer)
4.8/5
(35)

A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.

(Short Answer)
4.9/5
(27)

The process table in UNIX permits a virtually infinite number of entries.

(True/False)
4.9/5
(29)

Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.

(True/False)
4.7/5
(41)

Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.

(True/False)
4.8/5
(35)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)