SEC410 Week 1 Chapter 2 Quiz Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a recommended configuration of a firewall to defend against DoS attacks? A. Block ICMP packets that originate outside the network. B. Block all incoming packets. C. Block all ICMP packets. D. Block TCP packets that originate outside the network.

A. Block ICMP packets that originate outside the network.

What is the best method for defending against IP spoofing? A. Installing a router/firewall that blocks packets that appear to be originating within the network B. Installing a router/firewall that blocks packets that appear to be originating from outside the network C. Blocking all incoming TCP traffic D. Blocking all incoming ICMP traffic

A. Installing a router/firewall that blocks packets that appear to be originating within the network

Which of the following is the best definition for IP spoofing? A. Sending a packet that appears to come from a trusted IP address B. Rerouting packets to a different IP address C. Setting up a fake website that appears to be a different site D. Sending packets that are misconfigured

A. Sending a packet that appears to come from a trusted IP address

What is the name for the DoS attack that causes machines on a network to initiate a DoS against one of the network's servers? A. Smurf attack B. SYN flood C. Ping of Death D. Distributed denial of service

A. Smurf Attack

From the attacker's point of view, what is the primary weakness in a DoS attack? A. The attack must be sustained. B. The attack does not cause actual damage. C. The attack is easily thwarted. D. The attack is difficult to execute.

A. The attack must be sustained.

What is a Trojan horse? Each correct answer represents a complete solution. Choose all that apply. A. Software that self-replicates B. Software that appears to be benign but has some malicious purpose C. Software that deletes system files then infects other machines D. Software that causes harm to your system

B & D

Which of the following best describes a buffer overflow attack? A. An attack that overflows the target with too many TCP packets B. An attack that attempts to put too much data in a memory buffer C. An attack that attempts to send oversize TCP packets D. An attack that attempts to put misconfigured data into a memory buffer

B. An attack that attempts to put too much data in a memory buffer

Which of the following would be the best defense if your web server had limited resources but you needed a strong defense against DoS? A. A firewall B. RST cookies C. SYN cookies D. Stack tweaking

B. RST cookies

Which of the following is the best definition of a virus? A. Software that causes damage to system files B. Software that self-replicates C. Software that causes damage to any files D. Software that attaches to e-mail

B. Software that self-replicates

What is the danger that is inherent in IP spoofing attacks? A. They are very damaging to target systems. B. Many of these attacks open the door for other attacks. C. They can be difficult to stop. D. Many firewalls don't examine packets that seem to come from within the network.

D. Many firewalls don't examine packets that seem to come from within the network.

Which of the following virus attacks initiated a DoS attack? A. Faux B. Walachi C. Bagle D. MyDoom

D. MyDoom

What DoS attack is based on leaving connections half-open? A. Ping of Death B. Smuft Attack C. Distributed denial of service D. SYN flood

D. SYN flood

What is a technical weakness of the stack tweaking defense? A. It is complicated and requires very skilled technicians to implement. B. It only increases danger but can stop DoS attacks. C. It only decreases the danger but does not prevent it. D. It is ineffective against DoS attacks.

C. It only decreases the danger but does not prevent it.

What is the best way to defend against a buffer overflow? A. Use a robust firewall. B. Block TCP packets at the router. C. Keep all software patched and updated. D. Stop all ICMP traffic.

C. Keep all software patched and updated.

What is the name for a DoS defense that is dependent on sending back a hash code to the client? A. Stack tweaking B. RST cookie C. SYN cookie D. Server reflection

C. SYN cookie

Which of the following best describes session hacking? A. Taking control over a target machine via a Trojan horse B. Taking control of a target machine remotely C. Taking control of the communication link between two machiens D. Taking control of the login session

C. Taking control of the communication link between two machines


Conjuntos de estudio relacionados

Chapter 2: Encounter and Conquest

View Set

hair, skin & nails health assessment

View Set

Essentials of Statistics for the Behavioral Sciences Ch.3

View Set

Agl sociology quiz 2 (multiple choice)

View Set

Normal Balance: Debit or Credit?

View Set

Introductory Microeconomics Chapter 7 Quiz

View Set

Psych Midterm Evolve Quizes (2-6 (Not as important))

View Set