Deck 11: Denial-Of-Service Attacks

ملء الشاشة (f)
exit full mode
سؤال
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The process table in UNIX permits a virtually infinite number of entries.
سؤال
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
سؤال
Computers that are connected to the Internet utilize DNS to resolve URLs.
سؤال
ICMP is used to handle errors and exchange control messages on a network.
سؤال
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.

A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
سؤال
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.

A)Software
B)Isolated
C)Flood
D)Void
سؤال
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

A)Software
B)Flood
C)Voluntary
D)Isolated
سؤال
The ____ utility is used to determine if a specific machine located at a specific IP address is online.

A)Echo
B)Ping
C)ps
D)Alive
سؤال
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.

A)DNS overflow
B)Teardrop
C)Land
D)Chargen
سؤال
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
سؤال
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
سؤال
______________________________ is a database that maps domain names to IP addresses.
سؤال
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
سؤال
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
سؤال
What are the main targets of DoS attacks and what do the attacks accomplish?
سؤال
Describe an example of a voluntary DoS attack.
سؤال
Under what conditions can a flood attack occur?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Denial-Of-Service Attacks
1
Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active connection limit on all physical equipment and all software.
True
2
The process table in UNIX permits a virtually infinite number of entries.
False
3
Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
False
4
Computers that are connected to the Internet utilize DNS to resolve URLs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
5
ICMP is used to handle errors and exchange control messages on a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without considering the system's limitations.

A)involuntary DoS
B)distributed DoS
C)isolated DoS
D)voluntary DoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ attacks consume the limited resources of a computer or a network by transmitting a large number of packets as quickly as possible.

A)Software
B)Isolated
C)Flood
D)Void
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ attacks exploit the existing software weaknesses. The effect is either degraded performance or crashes on the victim server.

A)Software
B)Flood
C)Voluntary
D)Isolated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ utility is used to determine if a specific machine located at a specific IP address is online.

A)Echo
B)Ping
C)ps
D)Alive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
10
In a ____ attack, a hacker sends to the target computer a packet that has the identical source and destination IP address as that of the target computer.

A)DNS overflow
B)Teardrop
C)Land
D)Chargen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
12
____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire access to a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
13
______________________________ is a database that maps domain names to IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
14
____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they use UDP packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
15
A(n) ____________________ is a network of robot, or zombie, computers, which can harness their collective power to do considerable damage or send out huge amounts of junk e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
16
What are the main targets of DoS attacks and what do the attacks accomplish?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
17
Describe an example of a voluntary DoS attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
18
Under what conditions can a flood attack occur?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 18 في هذه المجموعة.