Deck 11: Denial-Of-Service Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 11: Denial-Of-Service Attacks
1
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
True
2
The process table in UNIX permits a virtually infinite number of entries.
False
3
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
False
4
Computers that are connected to the Internet utilize DNS to resolve URLs.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
ICMP is used to handle errors and exchange control messages on a network.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.
A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.
A)Software
B)Isolated
C)Flood
D)Void
A)Software
B)Isolated
C)Flood
D)Void
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.
A)Software
B)Flood
C)Voluntary
D)Isolated
A)Software
B)Flood
C)Voluntary
D)Isolated
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ utility is used to determine if a specific machine located at a specific IP address is online.
A)Echo
B)Ping
C)ps
D)Alive
A)Echo
B)Ping
C)ps
D)Alive
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.
A)DNS overflow
B)Teardrop
C)Land
D)Chargen
A)DNS overflow
B)Teardrop
C)Land
D)Chargen
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
______________________________ is a database that maps domain names to IP addresses.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are the main targets of DoS attacks and what do the attacks accomplish?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Describe an example of a voluntary DoS attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Under what conditions can a flood attack occur?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck