Exam 3: Network Traffic Signatures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the result of packets that are created which exceed the MTU of the network? How can this process be exploited?

Free
(Essay)
4.7/5
(29)
Correct Answer:
Verified

Packets that are larger than the MTU must be fragmented,or broken into multiple segments that are small enough for the network to handle.
After a packet is broken into fragments,each fragment receives its own IP header.However,in IPv4,only the initial packet in a set includes a header for higher-level protocols.Most filters need the information in the higher-level protocol header to make the decision to allow or deny the packet.Accordingly,attackers send only secondary fragments,which are any fragments other than the initial one.These packets are often allowed past the IDPS because filter rules are applied to first fragments only.

Which TCP flag can be the default response to a probe on a closed port?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

What can an IDPS check to try to determine whether a packet has been tampered with or damaged in transit?

Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
Verified

C

MATCHING -used by attackers to delay the progression of a scan

(Multiple Choice)
4.7/5
(29)

Under which attack category does a UNIX Sendmail exploitation fall?

(Multiple Choice)
4.9/5
(32)

MATCHING -a series of ICMP echo request packets in a range of IP addresses

(Multiple Choice)
4.9/5
(42)

A ______________ is made up of IP numbers and options,TCP flags,and port number that define a type of network activity.

(Short Answer)
4.9/5
(33)

Which element of an ICMP header would indicate that the packet is an ICMP echo request message.

(Multiple Choice)
5.0/5
(36)

In an RPC _________,a targeted host receives an RPC set request from a source IP address of 127.0.0.1.

(Short Answer)
4.9/5
(34)

What is a selective acknowledgement and how does it affect transmissions?

(Essay)
4.8/5
(32)

MATCHING -a standard set of communications rules that allows one computer to request a service from another computer

(Multiple Choice)
4.8/5
(33)

Describe the SYN flag and how it is used in the three-way handshake.

(Essay)
4.7/5
(30)

Which of the following correctly represents the port used by FTP control traffic and FTP file transfer traffic respectively?

(Multiple Choice)
4.8/5
(41)

What are the signatures of malformed packets that misuse the SYN and FIN flags? Briefly describe each.

(Essay)
4.8/5
(41)

What is the packet called where a Web browser sends a request to the Web server for Web page data?

(Multiple Choice)
4.8/5
(38)

The _______________ part of a packet is the actual data sent from an application on one computer to an application on another.

(Short Answer)
4.8/5
(35)

Which of the following is an accurate set of characteristics you would find in an attack signature?

(Multiple Choice)
4.8/5
(36)

In the three-way handshake,the first packet in the sequence has the ________ flag set.

(Short Answer)
4.9/5
(33)

Which of the following is NOT among the items of information that a CVE reference reports?

(Multiple Choice)
4.8/5
(39)

What is the difference between a vanilla port scan and a strobe port scan?

(Essay)
4.8/5
(31)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)