Test Your Knowledge Course 3, Module 3
Denial of service attack (DoS)
A network attack that targets a network or server and floods it with network traffic
On-path attack
An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit
What is the main objective of a Denial of Service (DoS) attack?
Disrupt normal business operations
In which attack would malicious actors gain access to a network, put themselves between a web browser and a web server, then sniff the packet to learn the devices' IP and MAC addresses?
On-path attack
Which type of attack occurs when a malicious actor sends an oversized ICMP packet to a server?
Ping of Death
A malicious actor takes down a network by flooding an authorized user's IP address with packets. Which type of DDoS attack is this?
Smurf attack
Fill in the blank: The _____ network attack occurs when an attacker intercepts a data packet in transit, then repeats it at another time.
replay
What are some common IP spoofing attacks?
replay attacks smurf attacks
What type of attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic?
A Distributed Denial of Service (DDoS) attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic. A DoS attack targets a single device, such as a network or server, and floods it with network traffic.
What type of attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake?
A SYN flood attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake. This overwhelms the server, making it unable to function.
IP spoofing
A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network
SYN flood attack
A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets
Distributed denial of service attack (DDoS)
A type of denial or service attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic
Fill in the blank: A _____ attack uses multiple devices in different locations to flood the target network with unwanted traffic.
Distributed Denial of Service (DDoS)
Which types of attacks take advantage of communication protocols by sending an overwhelming number of requests to a server?
ICMP flood and SYN flood attacks take advantage of communication protocols by sending an overwhelming number of requests to a server.
Fill in the blank: In a _____ attack, an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.
IP spoofing
A security team discovers that an attacker has taken advantage of the handshake process that is used to establish a TCP connection between a device and their server. Which DoS attack does this scenario describe?
SYN flood attack
Fill in the blank: The Denial of Service (DoS) attack _____ is caused when a hacker sends a system an ICMP packet that is bigger than 64KB.
The DoS attack Ping of Death is caused when a hacker sends a system an ICMP packet that is bigger than 64KB.
Packet sniffing
The practice of capturing and inspecting data packets across a network