Exam 7: Denial-Of-Service Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

replicating

Using forged source addresses is known as _________.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.

Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Verified

captcha

A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

(Multiple Choice)
4.8/5
(33)

There is very little that can be done to prevent a flash crowd.

(True/False)
4.9/5
(34)

The four lines of defense against DDoS attacks are: attack prevention and preemption, attack detection and filtering, attack source traceback and identification and _______.

(Short Answer)
4.8/5
(33)

______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

(Multiple Choice)
4.8/5
(24)

The source of the attack is explicitly identified in the classic ping floodattack.

(True/False)
4.9/5
(38)

_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

(Multiple Choice)
4.8/5
(28)

The standard protocol used for call setup in VoIP is the ________ Protocol.

(Short Answer)
4.8/5
(40)

A cyberslam is an application attack that consumes significantresources, limiting the server's ability to respond to valid requests fromother users.

(True/False)
4.9/5
(29)

______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

(Short Answer)
4.7/5
(38)

Requests and _______ are the two different types of SIP messages.

(Short Answer)
4.8/5
(35)

The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.

(Short Answer)
4.9/5
(34)

The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.

(Short Answer)
4.9/5
(33)

The attacker needs access to a high-volume network connection for aSYN spoof attack.

(True/False)
4.9/5
(34)

A _____ is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.

(Short Answer)
4.8/5
(37)

In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

(Multiple Choice)
4.9/5
(29)

A characteristic of reflection attacks is the lack of _______ traffic.

(Multiple Choice)
4.8/5
(36)

In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)