cspp Chapter 7 - Denial-of-Service Attacks -- Stallings 4th edition

Ace your homework & exams now with Quizwiz!

A cyberslam is an application attack that consumes significant resources, limiting the server's ability to respond to valid requests from other users. (True Or False)

T

A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. (True Or False)

T

SYN-ACK and ACK packets are transported using IP, which is an unreliable network protocol. (True Or False)

T

The SYN spoofing attack targets the table of TCP connections on the server. (True Or False)

T

The source of the attack is explicitly identified in the classic ping flood attack. (True Or False)

T

three-way handshake

TCP uses the _______ to establish a connection.

T

The SYN spoofing attack targets the table of TCP connections on the server.

SYN spoofing attack

The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

F

The attacker needs access to a high-volume network connection for a SYN spoof attack.

Define a reflection attack.

The attacker sends a network packet with a spoofed source address to a service running on some network server. The server (=reflector) responds to this packet, sending it to the spoofed source address that belongs to the actual attack target. This is then called a reflection attack.

T

The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised.

What is the goal of a flooding attack?

The intent is to overload the network capacity on some link to a server, and may aim to overload the server's ability to handle and respond to traffic.

A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

poison packet

During a ______ attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system and when the intermediary responds, the response is sent to the target.

reflection

If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.

replicating

Requests and _______ are the two different types of SIP messages.

responses

Using forged source addresses is known as _________.

source address spoofing

Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______

spidering

In reflection attacks, the ______ address directs all the packets at the desired target and any responses to the intermediary.

spoofed source

TCP uses the _______ to establish a connection.

three-way handshake

_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server. A) Application-based B) System-Based C) Random D) Amplification

A) Application-Based

A characteristic of reflection attacks is the lack of _______ traffic. A) backscatter B) network C) three-way D) botnet

A) backscatter

Using forged source addresses is known as _________. A) source address spoofing B) a three-way address C) random dropping D) Directed broadcast

A) source address spoofing

______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

Amplification

What types of packets are commonly used for flooding attacks?

Any type of packet can be used in a flooding attack. Commonly used: ICMP, UDP or TCP SYN.

_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

Application-based

In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system. A) SYN flood B) DNS amplification C) poison packet D) UDP flood

B) DNS amplification

______ relates to the capacity of the network links connecting a server to the wider Internet. A) Application Resource B) Network Bandwidth C) System Payload D) Directed Broadcast

B) Network Bandwidth

The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections. A) DNS Amplification B) SYN Spoofing attack C) basic flooding attack D) poison packet attack

B) SYN Spoofing Attack

Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______. A) trailing B) spidering C) spoofing D) crowding

B) Spidering

True or False? Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address.

False

True or False? Reflector and amplifier attacks use compromised systems running the attacker's programs.

False

True or False? Slowloris is a form of ICMP flooding.

False

True or False? The attacker needs access to a high-volume network connection for a SYN spoof attack.

False

_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.

Flooding

T

Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.

F

Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address.

A _______ flood refers to an attack that bombards Web servers with HTTP requests.

HTTP

The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.

IP-directed

Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets, an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.

ISP

What steps should be taken when a DoS attack is detected?

Identification of the type of attack, application of suitable filters to block the attack packets. In addition, an ISP may trace the flow of packets back in attempt to identify the source.

Why do many DoS attacks use packets with spoofed source addresses?

If there is a valid system at the spoofed source address, it will respond with a RST packet. However, if there is no system then no reply will return. In these cases the server will resend the packet a number of times before finally assuming the connection request has failed. In this period, the server is using an entry in its memory. If many connection requests with forged addresses are incoming, the memory fills up, making the server incapable of handing any more requests (not even legitimate ones).

DNS amplification

In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

What types of resources are targeted by such attacks?

+ Network bandwidth + System resources + Application resources

A DoS attack targeting application resources typically aims to overload or crash its network handling software. (True Or False)

F

DoS attacks cause damage or destruction of IT infrastructures. (True Or False)

F

Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address. (True Or False)

F

True or False? A DoS attack targeting application resources typically aims to overload or crash its network handling software.

False

True or False? DoS attacks cause damage or destruction of IT infrastructures.

False

The standard protocol used for call setup in VoIP is the ________ Protocol.

Session Initiation

F

Slowloris is a form of ICMP flooding.

T

A SIP flood attack exploits the fact that a single INVITE request triggers considerable resource consumption.

T

A cyberslam is an application attack that consumes significant resources, limiting the server's ability to respond to valid requests from other users.

Define a denial-of-service attack.

A denial of service is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as CPU, memory, bandwidth and disk space.

T

A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.

A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded. A) echo B) reflection C) poison packet D) flash flood

C) Poison Packet

_______ is a text-based protocol with a syntax similar to that of HTTP. A) RIP B) DIP C) SIP D) HIP

C) SIP

It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code. A) three-way handshake B) UDP flood C) SYN spoofing attack D) flash crowd

C) SYN spoofing attack

In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable. A) SYN spoofing attacks B) indirect flooding attacks C) ICMP attacks D) system address spoofing

D) SYN spoofing attacks

______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete. A) HTTP B) Reflection attacks C) SYN Flooding D) slowloris

D) Slowloris

Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______. A) poison packet B) slashdot C) backscatter traffic D) random drop

D) random drop

TCP uses the _______ to establish a connection. A) zombie B) SYN cookie C) directed broadcast D) three-way handshake

D) three-way handshake

SYN spoofing attack

It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.

What is the primary defense against many DoS attacks, and where is it implemented?

Limiting the ability of systems to send packets with spoofed source addresses. An ISP knows which addresses are allocated to all its customers and hence can ensure that valid source addresses are used in all packets from its customers.

random drop

Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _______.

______ relates to the capacity of the network links connecting a server to the wider Internet.

Network bandwidth

Define a distributed denial-of-service attack.

Recognizing the limitations of flooding attacks generated by a single system, hackers invented tools for the use of multiple systems to generate attacks. That is called a distributed denial-of service attack.

_______ is a text-based protocol with a syntax similar to that of HTTP.

SIP

The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

SYN spoofing attack

T

SYN-ACK and ACK packets are transported using IP, which is an unreliable network protocol.

What do the terms slashdotted and flash crowd refer to? What is the relation between these instances of legitimate network overhead and the consequences of a DoS attack?

These terms refer to the following occurrence: A posting to the well-known site Slashdot news aggregation site often results in overload to the referenced server system. There is very little that can be done to prevent this type of either accidental or deliberate overhead The provision of excess network bandwidth is the usual response.

Define an amplification attack.

They differ to reflection attacks in that they are generating multiple response packets for each original packet sent. This can be achieved by directing the original request to the broadcast address for some network. As a result, all hosts will respond, generating a flood of responses.

What defenses are possible to prevent an organization's system being used as intermediaries in an amplification attack?

They should have implemented antispoofing, directed broadcast and rate limiting filters. In addition you should have some form of automated network monitoring and intrusion detection system.

True or False? A SIP flood attack exploits the fact that a single INVITE request triggers considerable resource consumption.

True

True or False? A cyberslam is an application attack that consumes significant resources, limiting the server's ability to respond to valid requests from other users.

True

True or False? A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.

True

True or False? Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.

True

True or False? SYN-ACK and ACK packets are transported using IP, which is an unreliable network protocol.

True

True or False? The SYN spoofing attack targets the table of TCP connections on the server.

True

True or False? The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised.

True

True or False? The source of the attack is explicitly identified in the classic ping flood attack.

True

True or False? There is very little that can be done to prevent a flash crowd.

True

What defenses are possible against TCP SYN spoofing attacks?

Using a modified version of the TCP connection handling code, where the connection details are stored in a cookie on the client computer rather than the server.

source address spoofing

Using forged source addresses is known as _________.

What architecture does a distributed denial of service attack typically use?

Usually a botnet consisting of infected zombie PCs is used, that is under the control of a hacker. Usually a small number of systems act as handlers controlling a much larger number of agent systems that ultimately launch the attack.

Slowloris

______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

Network bandwidth

______ relates to the capacity of the network links connecting a server to the wider Internet.

The four lines of defense against DDoS attacks are: attack prevention and preemption, attack detection and filtering, attack source traceback and identification and _______.

attack reaction

The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.

backscatter

A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.

captcha

A _____ is an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units, memory, bandwidth, and disk space.

denial-of-service (DoS)

To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).

incident response


Related study sets

FINC 300-03 Chapter 1 Practice Problems

View Set

3306 3, Bus 316, Exam 1 Study, Supply Chain Ch 6-10, Supply Chain Operations Test 1, Chapter 1 SCM 304, OMGT - Chapter 1, OMGT Chapter 2, MGT 814 Chapter 4, Chapter 6 Supply Management, OSCMQuiz4

View Set

Fiscal and Monetary Policy Mini TEST 1/6/22

View Set

Medical Laboratory Science Review Harr 5.7 Chemistry - Enzymes and Cardiac Markers (41-80)

View Set

Chapter 08: Communication and the Nurse-Patient Relationship Study Guide

View Set

Pediatric practice questions exam 2

View Set