Exam 7: Denial-Of-Service Attacks
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
replicating
Using forged source addresses is known as _________.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
A
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.
Free
(Short Answer)
4.8/5
(42)
Correct Answer:
captcha
A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
(Multiple Choice)
4.8/5
(33)
The four lines of defense against DDoS attacks are: attack prevention and preemption, attack detection and filtering, attack source traceback and identification and _______.
(Short Answer)
4.8/5
(33)
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.
(Multiple Choice)
4.8/5
(24)
The source of the attack is explicitly identified in the classic ping floodattack.
(True/False)
4.9/5
(38)
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.
(Multiple Choice)
4.8/5
(28)
The standard protocol used for call setup in VoIP is the ________ Protocol.
(Short Answer)
4.8/5
(40)
A cyberslam is an application attack that consumes significantresources, limiting the server's ability to respond to valid requests fromother users.
(True/False)
4.9/5
(29)
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
(Short Answer)
4.7/5
(38)
Requests and _______ are the two different types of SIP messages.
(Short Answer)
4.8/5
(35)
The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.
(Short Answer)
4.9/5
(34)
The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
(Short Answer)
4.9/5
(33)
The attacker needs access to a high-volume network connection for aSYN spoof attack.
(True/False)
4.9/5
(34)
A _____ is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.
(Short Answer)
4.8/5
(37)
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.
(Multiple Choice)
4.9/5
(29)
A characteristic of reflection attacks is the lack of _______ traffic.
(Multiple Choice)
4.8/5
(36)
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)