6.9.13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your Intrusion Detection System (IDS) doesn't seem to be listing any new security attacks on your network. Which of the following DDoS attack methods is MOST likely being used?

Application Layer DDoS

A security analyst discovers that an attacker is attempting to launch a distributed denial-of-service (DDoS) attack on the company's network. What action should the security analyst take to prevent the DDoS attack from succeeding?

Configure the router to limit the amount of traffic coming from the attacker's IP address

An attack targets ICMP protocol vulnerabilities and is conducted by creating ICMP echo request packets using the spoofed IP address of the target machine. It then sends packets to the broadcast address network, which results in numerous devices responding with replies to the target's IP address, disabling it. Which type of attack is this?

Smurf DDoS attack

DDoS attacks are successful when they use all available bandwidth. What is the method an attacker normally uses to consume all available bandwidth to a targeted server?

Spoofing a target IP address by opening connections with multiple servers, then directing all SYN/ACK responses to the target server.

Which of the following BEST describes a DoS fragmentation attack?

An attack in which fake UDP or ICMP packets larger than the MTU are sent to exhaust the processing resources.

You discover that your web server is receiving a large number of HTTP requests, causing it to repeatedly load a web page. Which of the following DDoS attack methods does this fall under?

Application layer DDoS

It is important to be prepared for a DoS attack, as these attacks are becoming more common. Which of the following BEST describes the response you should take for a service degradation?

Set services to throttle or shut down.

You are currently attempting to establish a baseline of regular network traffic to detect potential DDoS attacks. At the moment, you are choosing a representative period for data collection. Which step in establishing a baseline are you currently working on?

Step 1

The information below is from Wireshark. Which kind of attack is occurring?

DDoS attack

Which of the following attacks sends fragmented packets that exceed 65, 535 bytes and cause a buffer overflow and system crash when reassembled?

Ping of death attack


Conjuntos de estudio relacionados

Module 14 - Planning for Disaster

View Set

Advanced anatomy Lab 1 practical

View Set

Examples: Alliteration, Assonance, Consonance

View Set

Quiz 1: Business Information Systems in Your Career

View Set

Canción - Baila mi Corazón - Belanova - Pop - México

View Set