While there are a wide range of different ways to execute a
DoS attack, they all are predicated on the same idea. What
is the basic concept behind a DoS attack?
DoS attack, they all are predicated on the same idea. What
is the basic concept behind a DoS attack?
Anonymous Quiz
11%
A. Computers don’t handle TCP packets well.
62%
B. Computers can handle only a finite load.
11%
C. Computers cannot handle large volumes of TCP traffic.
15%
D. Computers cannot handle large loads.
😁2
What is the most significant weakness in a DoS attack from
the attacker’s viewpoint?
the attacker’s viewpoint?
Anonymous Quiz
13%
A. The attack is often unsuccessful.
8%
B. The attack is difficult to execute.
9%
C. The attack is easy to stop.
70%
D. The attack must be sustained.
What is the most common class of DoS attacks?
Anonymous Quiz
57%
A. Distributed denial of service
23%
B. Smurf attacks
14%
C. SYN floods
5%
D. Ping of death
A range of countermeasures can help defend against DoS
attacks. What are three methods for protecting against SYN
flood attacks?
attacks. What are three methods for protecting against SYN
flood attacks?
Anonymous Quiz
58%
A. SYN cookies, RST cookies, and stack tweaking
19%
B. SYN cookies, DoS cookies, and stack tweaking
9%
C. DoS cookies, RST cookies, and stack deletion
13%
D. DoS cookies, SYN cookies, and stack deletion
Juan is explaining various DoS attacks to security operators
at his company. Which attack mentioned in this chapter
causes a network to perform a DoS attack on one of its own servers?
at his company. Which attack mentioned in this chapter
causes a network to perform a DoS attack on one of its own servers?
Anonymous Quiz
22%
A. SYN flood
9%
B. Ping of death
45%
C. Smurf attack
24%
D. DDoS
What is the name for a defense that depends on a hash
being sent back to the requesting client?
being sent back to the requesting client?
Anonymous Quiz
2%
A. Stack tweaking
9%
B. RST cookies
13%
C. SYN cookies
76%
D. Hash tweaking
. What type of defense depends on sending the client an
incorrect SYN/ACK?
incorrect SYN/ACK?
Anonymous Quiz
24%
A. Stack tweaking
11%
B. RST cookies
55%
C. SYN cookies
11%
D. Hash tweaking
You are attempting to explain various DoS attacks to a new security technician. You want to make sure she can differentiate between these different attacks and notice the
signs of a specific attack. What type of defense depends on changing the server so that unfinished handshaking times
out sooner?
signs of a specific attack. What type of defense depends on changing the server so that unfinished handshaking times
out sooner?
You are attempting to explain various DoS attacks to a new
security technician.
security technician.
Anonymous Quiz
62%
A. Stack tweaking
9%
B. RST cookies
22%
C. SYN cookies
7%
D. Hash tweaking
What type of attack is dependent on sending packets that
are too large for the server to handle?
are too large for the server to handle?
Anonymous Quiz
72%
A. Ping of death
9%
B. Smurf attack
9%
C. Slammer attack
9%
D. DDoS
You want to make sure your team can identify the various
DoS attack vectors. What type of attack uses the victim’s
own network routers to perform a DoS attack on the target?
DoS attack vectors. What type of attack uses the victim’s
own network routers to perform a DoS attack on the target?
Anonymous Quiz
6%
A. Ping of death
23%
B. Smurf attack
25%
C. Slammer attack
46%
D. DDoS
There have been many different types of attacks over the
years. Which of the following is an example of a DDoS
attack?
years. Which of the following is an example of a DDoS
attack?
Anonymous Quiz
53%
A. MyDoom virus
15%
B. Bagle virus
18%
C. DoS virus
15%
D. Smurf virus
How can securing internal routers help protect against DoS
attacks?
attacks?
Anonymous Quiz
17%
A. Attacks cannot occur if the internal router is secured.
21%
B. Because attacksoriginateOutside the network,securinginternalrouters cannothelpprotect againstDoS.
19%
C. Securing the router will only stop router-based DoSattacks.
43%
D. It will prevent an attack from propagating across networksegments.
What can you do to your internal network routers to help
defend against DoS attacks?
defend against DoS attacks?
Anonymous Quiz
6%
A. Disallow all traffic that is not encrypted
25%
B. Disallow all traffic that comes from outside the network
12%
C. Disallow all traffic that comes from inside the network
58%
D. Disallow all traffic that comes from untrusted sources
There are classic attacks that, while several years old, are
worthy of study due to their significance in the history of
cybersecurity. Which of the following was rated by many experts (at the time) to be the fastest growing virus on the Internet?
worthy of study due to their significance in the history of
cybersecurity. Which of the following was rated by many experts (at the time) to be the fastest growing virus on the Internet?
Anonymous Quiz
53%
A. MyDoom virus
13%
B. Bagle virus
19%
C. Slammer virus
15%
D. Smurf virus
No attack mitigation strategy is perfect, and you need to
allow at least some traffic into and out of your network, or
else your network is of no use. What can you do with your firewall to defend against at least some DoS attacks?
allow at least some traffic into and out of your network, or
else your network is of no use. What can you do with your firewall to defend against at least some DoS attacks?
Anonymous Quiz
14%
A. Block all incoming traffic
14%
B. Block all incoming TCP packets
9%
C. Block all incoming traffic on port 80
63%
D. Block all incoming ICMP packets
You are trying to identify all potential DoS attack vectors. In
doing so, you hope to provide mitigation for each of these
attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?
doing so, you hope to provide mitigation for each of these
attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?
Anonymous Quiz
63%
Many Denial Of Service attacks are conducted by using aTrojan horse to get an unsuspecting.....
11%
f you can stop a Trojan horse attack, you will also stopDoS attacks.
18%
A Trojan horse will often open ports and thus allow DoSattacks.
8%
A Trojan horse has much the same effect as a DoSattack.
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
You are trying to identify all potential DoS attack vectors. In
doing so, you hope to provide mitigation for each of these
attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?
doing so, you hope to provide mitigation for each of these
attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?
Many denial of service attacks are conducted by using a
Trojan horse to get an unsuspecting machine to execute
the DoS attack.
Trojan horse to get an unsuspecting machine to execute
the DoS attack.
كل مايخص الحاسوب والبرامج (كمبيوتر -اندرويد) برمجة وغيرها
Many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack.
هذا تكمله للاختيار الاول لان التيليجرام يطلب عدد معين من الاحرف 😔
👏2
الى هنا نكون قد انتهينا من اسئلة الشبتر الرابع
بالتوفيق لكم جميعا🌹
بالتوفيق لكم جميعا🌹
❤3👍2
توزيع_مستوى_الثالث_تكنلوجيا_المعلومات_يوم_الاحد27_1.pdf
212.4 KB
توزيع مستوى الثالث تكنلوجيا المعلومات يوم الاحد27.pdf