كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها – Telegram
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
1.26K subscribers
243 photos
4 videos
765 files
177 links
لكل ما يخص الحاسوب
Download Telegram
الى هنا نكون قد انتهينا من اسئلة الشبتر الثالث


بالتوفيق لكم جميعا🌹
👍32
When considering the various attacks that can be executed
on your system, it is important to understand which attacks
are most common. Of the following, which is one of the most common and simplest attacks on a system?
Anonymous Quiz
65%
A. Denial of service attack
18%
B. Buffer overflow
8%
C. Session hacking
8%
D. Password cracking
🥰1
All DoS attacks are predicated on overwhelming a system’s
workload capacity. Therefore, measuring the workload of a
system is critical. Which of the following is not a valid way to define a computer’s workload?
Anonymous Quiz
18%
A. Number of simultaneous users
9%
B. Storage capacity
64%
C. Maximum voltage
9%
D. Speed of network connection
It is important to understand the different types of DoS
attacks and the symptoms of those attacks. Leaving a
connection half open is a symptom of which type of attack?
Anonymous Quiz
20%
A. Smurf attack
15%
B. Partial attack
58%
C. SYN flood attack
7%
D. DDoS attack
Juan is explaining various DoS attacks to security operators
at his company. Which attack mentioned in this chapter
causes a network to perform a DoS attack on one of its own servers?
Anonymous Quiz
22%
A. SYN flood
9%
B. Ping of death
45%
C. Smurf attack
24%
D. DDoS
What is the name for a defense that depends on a hash
being sent back to the requesting client?
Anonymous Quiz
2%
A. Stack tweaking
9%
B. RST cookies
13%
C. SYN cookies
76%
D. Hash tweaking
You are attempting to explain various DoS attacks to a new security technician. You want to make sure she can differentiate between these different attacks and notice the
signs of a specific attack. What type of defense depends on changing the server so that unfinished handshaking times
out sooner?
What type of attack is dependent on sending packets that
are too large for the server to handle?
Anonymous Quiz
72%
A. Ping of death
9%
B. Smurf attack
9%
C. Slammer attack
9%
D. DDoS
You want to make sure your team can identify the various
DoS attack vectors. What type of attack uses the victim’s
own network routers to perform a DoS attack on the target?
Anonymous Quiz
6%
A. Ping of death
23%
B. Smurf attack
25%
C. Slammer attack
46%
D. DDoS
There have been many different types of attacks over the
years. Which of the following is an example of a DDoS
attack?
Anonymous Quiz
53%
A. MyDoom virus
15%
B. Bagle virus
18%
C. DoS virus
15%
D. Smurf virus