CS Course 3 Module 3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the maximum size for a ICMP packet

64KB

Which of the following statements accurately describes a smurf attack?

A network attack performed when an attacker sniffs an authorized user's IP address and floods it with packets

What is a replay IP spoofing attack?

A network attack where a actor intercepts a data packet in transit, delays or repeats it at another time

What is a On-path IP spoofing attack?

A network attack where a actor intercepts an authorized connection and intercepts or alters the data in transit

What is a Smurf IP spoofing attack?

A network attack where a actor sniffs an authorized users IP address and floods it with packets which can bring down the network

What is a Denial of Service attack (DoS)

An attack that targets a network or server and floods it with network traffic

Ping of Death Attack

Cause when a hacker pings a system with oversized ICMP packet bigger than 64KB

What is the main objective of a Denial of Service (DoS) attack?

Disrupt normal business operations

What type of attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic?

Distributed Denial of Service (DDoS) attack

Which types of attacks take advantage of communication protocols by sending an overwhelming number of requests to a server?

DoS attack ICMP DoS attack SYN flood

Passive packet sniffing involves data packets being manipulated while in transit, which may include injecting internet protocols to redirect the packets to unintended ports or changing the information the packet contains. (T/F)

False

A malicious actor changes to the source IP of a data packet in order to communicate over an organization's internal network. Which type of attack is this?

IP spoofing

Which type of attack involves an attacker changing the source IP of a data packet to impersonate an authorized system and gain access to the network?

IP spoofing

Which of the following statements DOES NOT accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks?

In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.

What is IP spoofing?

Network attack performed when an attacker changes source IP of data packet (header) to impersonate an authorized system and access a network

what are the 3 types of IP spoofing attacks?

On-path Replay smurf

In a/an ____ attack, a malicious actor places themselves in the middle of an authorized connection and intercepts the data in transit.

On-path attack

Security analysts use ____ to analyze and capture packets when investigating ongoing incidents or debugging network issues.

Packet sniffing

Which type of packet sniffing allows malicious actors to view and read data packets in transit?

Passive packet sniffing

The Denial of Service (DoS) attack _____ is caused when a hacker sends a system an ICMP packet that is bigger than 64KB. 1 point

Ping of Death

Which type of attack occurs when a malicious actor sends an oversized ICMP packet to a server?

Ping of Death

Which of the following is NOT common network attacks?

Proxy servers

The _____ network attack occurs when an attacker intercepts a data packet in transit, then repeats it at another time.

Replay

What type of attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake?

SYN flood attack

what are the 3 common network level DoS attacks

SYN flood attack Internet Control Message Protocol(ICMP) Ping of Death

Which of the following attacks DOES NOT use IP spoofing?

Tailgating

A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?

The server has stopped responding after receiving an unusually high number of incoming SYN packets.

What happens during a Denial of Service (DoS) attack?

The target crashes and normal business operations cannot continue.

A security analyst can protect against malicious packet sniffing by _____ to encrypt data as it travels across a network.

Using a VPN

Which part of a data packet may contain valuable information about the data in transit?

body

To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.

firewall

Internet Control Message Protocol(ICMP)

internet protocol used by devices to tell each other about data transmission errors across the network

What are the different types of network attacks

packet sniffing packet flooding spoofing Malware

What happens with a SYN flood attack

simulates a TCP connection and floods a server with SYN packets

A malicious actor takes down a network by flooding an authorized user's IP address with packets. Which type of DDoS attack is this?

smurf

What is a Distributed Denial of Service attack (DDoS)

type of DoS attack that uses multiple devices or servers at different locations to flood network


Kaugnay na mga set ng pag-aaral

Art, Chapter 11, Sculpture and Installation

View Set

principles of real estate 1 unit 12 study questions

View Set

00.07 Module Exam: earth space science

View Set

Unit 7: Matter and Energy in Ecosystems

View Set

Chapter 19/1: FLORIDA GENERAL REVIEW

View Set

Nursing Process, Professional Behavior & Safety Week 1

View Set

Unit 9 Writing and Solving Quadratic Equations

View Set