CS Course 3 Module 3
What is the maximum size for a ICMP packet
64KB
Which of the following statements accurately describes a smurf attack?
A network attack performed when an attacker sniffs an authorized user's IP address and floods it with packets
What is a replay IP spoofing attack?
A network attack where a actor intercepts a data packet in transit, delays or repeats it at another time
What is a On-path IP spoofing attack?
A network attack where a actor intercepts an authorized connection and intercepts or alters the data in transit
What is a Smurf IP spoofing attack?
A network attack where a actor sniffs an authorized users IP address and floods it with packets which can bring down the network
What is a Denial of Service attack (DoS)
An attack that targets a network or server and floods it with network traffic
Ping of Death Attack
Cause when a hacker pings a system with oversized ICMP packet bigger than 64KB
What is the main objective of a Denial of Service (DoS) attack?
Disrupt normal business operations
What type of attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic?
Distributed Denial of Service (DDoS) attack
Which types of attacks take advantage of communication protocols by sending an overwhelming number of requests to a server?
DoS attack ICMP DoS attack SYN flood
Passive packet sniffing involves data packets being manipulated while in transit, which may include injecting internet protocols to redirect the packets to unintended ports or changing the information the packet contains. (T/F)
False
A malicious actor changes to the source IP of a data packet in order to communicate over an organization's internal network. Which type of attack is this?
IP spoofing
Which type of attack involves an attacker changing the source IP of a data packet to impersonate an authorized system and gain access to the network?
IP spoofing
Which of the following statements DOES NOT accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks?
In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
What is IP spoofing?
Network attack performed when an attacker changes source IP of data packet (header) to impersonate an authorized system and access a network
what are the 3 types of IP spoofing attacks?
On-path Replay smurf
In a/an ____ attack, a malicious actor places themselves in the middle of an authorized connection and intercepts the data in transit.
On-path attack
Security analysts use ____ to analyze and capture packets when investigating ongoing incidents or debugging network issues.
Packet sniffing
Which type of packet sniffing allows malicious actors to view and read data packets in transit?
Passive packet sniffing
The Denial of Service (DoS) attack _____ is caused when a hacker sends a system an ICMP packet that is bigger than 64KB. 1 point
Ping of Death
Which type of attack occurs when a malicious actor sends an oversized ICMP packet to a server?
Ping of Death
Which of the following is NOT common network attacks?
Proxy servers
The _____ network attack occurs when an attacker intercepts a data packet in transit, then repeats it at another time.
Replay
What type of attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake?
SYN flood attack
what are the 3 common network level DoS attacks
SYN flood attack Internet Control Message Protocol(ICMP) Ping of Death
Which of the following attacks DOES NOT use IP spoofing?
Tailgating
A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?
The server has stopped responding after receiving an unusually high number of incoming SYN packets.
What happens during a Denial of Service (DoS) attack?
The target crashes and normal business operations cannot continue.
A security analyst can protect against malicious packet sniffing by _____ to encrypt data as it travels across a network.
Using a VPN
Which part of a data packet may contain valuable information about the data in transit?
body
To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.
firewall
Internet Control Message Protocol(ICMP)
internet protocol used by devices to tell each other about data transmission errors across the network
What are the different types of network attacks
packet sniffing packet flooding spoofing Malware
What happens with a SYN flood attack
simulates a TCP connection and floods a server with SYN packets
A malicious actor takes down a network by flooding an authorized user's IP address with packets. Which type of DDoS attack is this?
smurf
What is a Distributed Denial of Service attack (DDoS)
type of DoS attack that uses multiple devices or servers at different locations to flood network