MIS170 CH2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

8. Which of the following is a recommended configuration of a firewall to defend against DoS attacks?

A. Block ICMP packets that originate outside the network

13. What is the best method of defending against IP spoofing?

A. Installing a router/firewall that blocks packets that appear to be originating within the network

11. Which of the following is the best definition for IP spoofing?

A. Sending a packet that appears to come from a trusted IP

6. What is the name for a DoS attack that causes machines on a network to initiate a DoS against one of that network's servers?

A. Smurf attack

1. From the attacker's point of view, what is the primary weakness in a DoS attack?

A. The attack must be sustained.

9. Which of the following best describes a buffer overflow attack?

B. An attack that attempts to put too much data in a memory buffer

5. What is a technical weakness of the Stack tweaking defense?

B. It only decreases time out but does not actually stop DoS attacks.

4. Which of the following would be the best defense if your Web server had limited resources but you needed a strong defense against DoS?

B. RST cookies

16. What is a Trojan horse?

B. Software that appears to be benign but really has some malicious purpose

15. Which of the following is the best definition of a virus?

B. Software that self-replicates

12. What is the danger inherent in IP spoofing attacks?

D. Many firewalls don't examine packets that seem to come from within the network.

2. What DoS attack is based on leaving connections half open?

D. SYN flood

10. What is the best way to defend against a buffer overflow?

D. Stop all ICMP traffic

7. Which of the following virus attacks initiated a DoS attack?

MyDoom

3. What is the name for a DoS defense that is dependent on sending back a hash code to the client?

C. SYN cookie

14. Which of the following best describes session hacking?

C. Taking control of the communication link between two machines


संबंधित स्टडी सेट्स

Chapter 5 - Value Chain Analysis

View Set

Stare Decisis/ System of Precedent ( The Common Law Tradition)

View Set

CHAPTER THREE: THE WORLD MARKETPLACE

View Set