Computer Network 14.8.11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A hacker has discovered UDP protocol weaknesses on a target system. The hacker attempts to send large numbers of UDP packets from a system with a spoofed IP address, which broadcasts out to the network in an attempt to flood the target system with an overwhelming amount of UDP responses. Which of the following DoS attacks is the hacker attempting to use?

Fraggle attack

Which of the following best describes a reverse proxy method for protecting a system from a DoS attack?

Redirects all traffic before it is forwarded to a server, so the redirected system takes the impact.

It is important to be prepared for a DoS attack. These attacks are becoming more common. Which of the following best describes the response you should take for a service degradation?

Services can be set to throttle or even shut down.

Creating an area of the network where offending traffic is forwarded and dropped is known as _________?

Black hole filtering

In which of the following attacks does the attacker blocks all traffic by taking up all available bandwidth between the target computer and the internet?

Volumetric attack

You suspect that an ICMP flood attack is taking place on your system from time to time, so you have used Wireshark to capture packets using the tcp.flags.syn==1 filter. Initially, you saw an occasional SYN or ACK packet. After a short while, you started seeing packets as shown in the image. Using the information shown, which of the following explains the difference between normal ICMP (ping) requests and an ICMP flood?

With the flood, all packets come from the same source IP address in quick succession.

The ping command is designed to test connectivity between two computers. There are several command options available to customize ping, making it a useful tool for network administrators. On Windows, the default number of ping requests is set is four. Which of the following command options will change the default number of ping requests?

-n

Which of the following best describes a DoS attack?

A hacker overwhelms or damages a system and prevents users from accessing a service.

An attacker may use compromised websites and emails to distribute specially designed malware to poorly secured devices. This malware provides an access point to the attacker, which he can use to control the device. Which of the following devices can the attacker use?

Any device that can communicate over the intranet can be hacked.

Which of the following best describes the key difference between DoS and DDoS?

Attackers use numerous computers and connections.


Ensembles d'études connexes

Ch. 9 Healthcare Marketing-Final Exam Prep

View Set

CH 12 - NERVOUS SYSTEM & CH 13 - SPINAL CORD

View Set

Short Answer: Surgical Technology

View Set

Chapter 60: Assessment of Integumentary Function, Chapter 61, Burns Ch.62 E2, Burns

View Set

Chapter 68: Management of Patients with Neurologic Trauma (Brunner)

View Set

Complicated Newborn Practice Test

View Set

NCLEX Qs 280 Exam 3: HIV/AIDS & TB

View Set