Deck 11: Denial-Of-Service Attacks

Full screen (f)
exit full mode
Question
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
Use Space or
up arrow
down arrow
to flip the card.
Question
The process table in UNIX permits a virtually infinite number of entries.
Question
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
Question
Computers that are connected to the Internet utilize DNS to resolve URLs.
Question
ICMP is used to handle errors and exchange control messages on a network.
Question
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.

A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
Question
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.

A)Software
B)Isolated
C)Flood
D)Void
Question
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

A)Software
B)Flood
C)Voluntary
D)Isolated
Question
The ____ utility is used to determine if a specific machine located at a specific IP address is online.

A)Echo
B)Ping
C)ps
D)Alive
Question
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.

A)DNS overflow
B)Teardrop
C)Land
D)Chargen
Question
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
Question
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
Question
______________________________ is a database that maps domain names to IP addresses.
Question
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
Question
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
Question
What are the main targets of DoS attacks and what do the attacks accomplish?
Question
Describe an example of a voluntary DoS attack.
Question
Under what conditions can a flood attack occur?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Denial-Of-Service Attacks
1
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
True
2
The process table in UNIX permits a virtually infinite number of entries.
False
3
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
False
4
Computers that are connected to the Internet utilize DNS to resolve URLs.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
ICMP is used to handle errors and exchange control messages on a network.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.

A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.

A)Software
B)Isolated
C)Flood
D)Void
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

A)Software
B)Flood
C)Voluntary
D)Isolated
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ utility is used to determine if a specific machine located at a specific IP address is online.

A)Echo
B)Ping
C)ps
D)Alive
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.

A)DNS overflow
B)Teardrop
C)Land
D)Chargen
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
______________________________ is a database that maps domain names to IP addresses.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are the main targets of DoS attacks and what do the attacks accomplish?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Describe an example of a voluntary DoS attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Under what conditions can a flood attack occur?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.