Deck 7: Denial-Of-Service Attacks

Full screen (f)
exit full mode
Question
TCP uses the _______ to establish a connection.

A) zombie
B) SYN cookie
C) directed broadcast
D) three-way handshake
Use Space or
up arrow
down arrow
to flip the card.
Question
DoS attacks cause damage or destruction of IT infrastructures.
Question
Slowloris is a form of ICMP flooding.
Question
Flooding attacks take a variety of forms based on which networkprotocol is being used to implement the attack.
Question
There is very little that can be done to prevent a flash crowd.
Question
A denial-of-service attack is an attempt to compromise availability byhindering or blocking completely the provision of some service.
Question
A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

A) echo
B) reflection
C) poison packet
D) flash flood
Question
Using forged source addresses is known as _________.

A) source address spoofing
B) a three-way address
C) random dropping
D) directed broadcast
Question
A SIP flood attack exploits the fact that a single INVITE requesttriggers considerable resource consumption.
Question
Reflector and amplifier attacks use compromised systems running theattacker's programs.
Question
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

A) DNS amplification attack
B) SYN spoofing attack
C) basic flooding attack
D) poison packet attack
Question
______ relates to the capacity of the network links connecting a server to the wider Internet.

A) Application resource
B) Network bandwidth
C) System payload
D) Directed broadcast
Question
The SYN spoofing attack targets the table of TCP connections on theserver.
Question
Given sufficiently privileged access to the network handling code on acomputer system, it is difficult to create packets with a forged sourceaddress.
Question
The best defense against being an unwitting participant in a DDoSattack is to prevent your systems from being compromised.
Question
A DoS attack targeting application resources typically aims to overloador crash its network handling software.
Question
The source of the attack is explicitly identified in the classic ping floodattack.
Question
The attacker needs access to a high-volume network connection for aSYN spoof attack.
Question
SYN-ACK and ACK packets are transported using IP, which is anunreliable network protocol.
Question
A cyberslam is an application attack that consumes significantresources, limiting the server's ability to respond to valid requests fromother users.
Question
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

A) Application-based
B) System-based
C) Random
D) Amplification
Question
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
Question
The four lines of defense against DDoS attacks are: attack prevention and preemption, attack detection and filtering, attack source traceback and identification and _______.
Question
_______ is a text-based protocol with a syntax similar to that of HTTP.

A) RIP
B) DIP
C) SIP
D) HIP
Question
In reflection attacks, the ______ address directs all the packets at the desired target and any responses to the intermediary.
Question
It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.

A) three-way handshake
B) UDP flood
C) SYN spoofing attack
D) flash crowd
Question
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
Question
Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______.

A) poison packet
B) slashdot
C) backscatter traffic
D) random drop
Question
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

A) SYN spoofing attacks
B) indirect flooding attacks
C) ICMP attacks
D) system address spoofing
Question
A _______ flood refers to an attack that bombards Web servers with HTTP requests.
Question
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

A) SYN flood
B) DNS amplification
C) poison packet
D) UDP flood
Question
The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.
Question
When a DoS attack is detected, the first step is to _______.

A) identify the attack
B) analyze the response
C) design blocking filters
D) shut down the network
Question
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

A) HTTP
B) Reflection attacks
C) SYN flooding
D) Slowloris
Question
The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
Question
The standard protocol used for call setup in VoIP is the ________ Protocol.
Question
Requests and _______ are the two different types of SIP messages.
Question
Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______.

A) trailing
B) spidering
C) spoofing
D) crowding
Question
A characteristic of reflection attacks is the lack of _______ traffic.

A) backscatter
B) network
C) three-way
D) botnet
Question
During a ______ attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system and when the intermediary responds, the response is sent to the target.
Question
To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).
Question
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.
Question
If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.
Question
Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets, an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.
Question
A _____ is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Denial-Of-Service Attacks
1
TCP uses the _______ to establish a connection.

A) zombie
B) SYN cookie
C) directed broadcast
D) three-way handshake
D
2
DoS attacks cause damage or destruction of IT infrastructures.
False
3
Slowloris is a form of ICMP flooding.
False
4
Flooding attacks take a variety of forms based on which networkprotocol is being used to implement the attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
There is very little that can be done to prevent a flash crowd.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A denial-of-service attack is an attempt to compromise availability byhindering or blocking completely the provision of some service.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

A) echo
B) reflection
C) poison packet
D) flash flood
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Using forged source addresses is known as _________.

A) source address spoofing
B) a three-way address
C) random dropping
D) directed broadcast
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A SIP flood attack exploits the fact that a single INVITE requesttriggers considerable resource consumption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Reflector and amplifier attacks use compromised systems running theattacker's programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

A) DNS amplification attack
B) SYN spoofing attack
C) basic flooding attack
D) poison packet attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
______ relates to the capacity of the network links connecting a server to the wider Internet.

A) Application resource
B) Network bandwidth
C) System payload
D) Directed broadcast
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The SYN spoofing attack targets the table of TCP connections on theserver.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Given sufficiently privileged access to the network handling code on acomputer system, it is difficult to create packets with a forged sourceaddress.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The best defense against being an unwitting participant in a DDoSattack is to prevent your systems from being compromised.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A DoS attack targeting application resources typically aims to overloador crash its network handling software.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The source of the attack is explicitly identified in the classic ping floodattack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The attacker needs access to a high-volume network connection for aSYN spoof attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
SYN-ACK and ACK packets are transported using IP, which is anunreliable network protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A cyberslam is an application attack that consumes significantresources, limiting the server's ability to respond to valid requests fromother users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

A) Application-based
B) System-based
C) Random
D) Amplification
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The four lines of defense against DDoS attacks are: attack prevention and preemption, attack detection and filtering, attack source traceback and identification and _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
_______ is a text-based protocol with a syntax similar to that of HTTP.

A) RIP
B) DIP
C) SIP
D) HIP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
In reflection attacks, the ______ address directs all the packets at the desired target and any responses to the intermediary.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.

A) three-way handshake
B) UDP flood
C) SYN spoofing attack
D) flash crowd
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______.

A) poison packet
B) slashdot
C) backscatter traffic
D) random drop
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

A) SYN spoofing attacks
B) indirect flooding attacks
C) ICMP attacks
D) system address spoofing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A _______ flood refers to an attack that bombards Web servers with HTTP requests.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

A) SYN flood
B) DNS amplification
C) poison packet
D) UDP flood
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
When a DoS attack is detected, the first step is to _______.

A) identify the attack
B) analyze the response
C) design blocking filters
D) shut down the network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

A) HTTP
B) Reflection attacks
C) SYN flooding
D) Slowloris
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The standard protocol used for call setup in VoIP is the ________ Protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Requests and _______ are the two different types of SIP messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______.

A) trailing
B) spidering
C) spoofing
D) crowding
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A characteristic of reflection attacks is the lack of _______ traffic.

A) backscatter
B) network
C) three-way
D) botnet
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
During a ______ attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system and when the intermediary responds, the response is sent to the target.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets, an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A _____ is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.