Deck 7: Denial-Of-Service Attacks

ملء الشاشة (f)
exit full mode
سؤال
The source of the attack is explicitly identified in the classic ping flood
attack.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A SIP flood attack exploits the fact that a single INVITE request
triggers considerable resource consumption.
سؤال
______ relates to the capacity of the network links connecting a server to the wider Internet.

A)Application resource
B)Network bandwidth
C)System payload
D)Directed broadcast
سؤال
The best defense against being an unwitting participant in a DDoS
attack is to prevent your systems from being compromised.
سؤال
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

A)DNS amplification attack
B)SYN spoofing attack
C)basic flooding attack
D)poison packet attack
سؤال
A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

A)echo
B)reflection
C)poison packet
D)flash flood
سؤال
Flooding attacks take a variety of forms based on which network
protocol is being used to implement the attack.
سؤال
There is very little that can be done to prevent a flash crowd.
سؤال
TCP uses the _______ to establish a connection.

A)zombie
B)SYN cookie
C)directed broadcast
D)three-way handshake
سؤال
The attacker needs access to a high-volume network connection for a
SYN spoof attack.
سؤال
A denial-of-service attack is an attempt to compromise availability by
hindering or blocking completely the provision of some service.
سؤال
SYN-ACK and ACK packets are transported using IP,which is an
unreliable network protocol.
سؤال
Given sufficiently privileged access to the network handling code on a
computer system,it is difficult to create packets with a forged source
address.
سؤال
A cyberslam is an application attack that consumes significant
resources,limiting the server's ability to respond to valid requests from
other users.
سؤال
A DoS attack targeting application resources typically aims to overload
or crash its network handling software.
سؤال
Reflector and amplifier attacks use compromised systems running the
attacker's programs.
سؤال
The SYN spoofing attack targets the table of TCP connections on the
server.
سؤال
Slowloris is a form of ICMP flooding.
سؤال
Using forged source addresses is known as _________.

A)source address spoofing
B)a three-way address
C)random dropping
D)directed broadcast
سؤال
DoS attacks cause damage or destruction of IT infrastructures.
سؤال
The standard protocol used for call setup in VoIP is the ________ Protocol.
سؤال
The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.
سؤال
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

A)SYN spoofing attacks
B)indirect flooding attacks
C)ICMP attacks
D)system address spoofing
سؤال
A characteristic of reflection attacks is the lack of _______ traffic.

A)backscatter
B)network
C)three-way
D)botnet
سؤال
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
سؤال
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

A)SYN flood
B)DNS amplification
C)poison packet
D)UDP flood
سؤال
During a ______ attack,the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system and when the intermediary responds,the response is sent to the target.
سؤال
The four lines of defense against DDoS attacks are: attack prevention and preemption,attack detection and filtering,attack source traceback and identification and _______.
سؤال
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

A)Application-based
B)System-based
C)Random
D)Amplification
سؤال
_______ is a text-based protocol with a syntax similar to that of HTTP.

A)RIP
B)DIP
C)SIP
D)HIP
سؤال
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
سؤال
Requests and _______ are the two different types of SIP messages.
سؤال
The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
سؤال
In reflection attacks,the ______ address directs all the packets at the desired target and any responses to the intermediary.
سؤال
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

A)HTTP
B)Reflection attacks
C)SYN flooding
D)Slowloris
سؤال
When a DoS attack is detected,the first step is to _______.

A)identify the attack
B)analyze the response
C)design blocking filters
D)shut down the network
سؤال
A _______ flood refers to an attack that bombards Web servers with HTTP requests.
سؤال
Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______.

A)trailing
B)spidering
C)spoofing
D)crowding
سؤال
It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.

A)three-way handshake
B)UDP flood
C)SYN spoofing attack
D)flash crowd
سؤال
Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows,allowing a new connection attempt to proceed is _______.

A)poison packet
B)slashdot
C)backscatter traffic
D)random drop
سؤال
If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.
سؤال
A _____ is an action that prevents or impairs the authorized use of networks,systems,or applications by exhausting resources such as central processing units,memory,bandwidth,and disk space.
سؤال
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.
سؤال
Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets,an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.
سؤال
To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Denial-Of-Service Attacks
1
The source of the attack is explicitly identified in the classic ping flood
attack.
True
2
A SIP flood attack exploits the fact that a single INVITE request
triggers considerable resource consumption.
True
3
______ relates to the capacity of the network links connecting a server to the wider Internet.

A)Application resource
B)Network bandwidth
C)System payload
D)Directed broadcast
B
4
The best defense against being an unwitting participant in a DDoS
attack is to prevent your systems from being compromised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

A)DNS amplification attack
B)SYN spoofing attack
C)basic flooding attack
D)poison packet attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

A)echo
B)reflection
C)poison packet
D)flash flood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
Flooding attacks take a variety of forms based on which network
protocol is being used to implement the attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
There is very little that can be done to prevent a flash crowd.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
TCP uses the _______ to establish a connection.

A)zombie
B)SYN cookie
C)directed broadcast
D)three-way handshake
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
The attacker needs access to a high-volume network connection for a
SYN spoof attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
A denial-of-service attack is an attempt to compromise availability by
hindering or blocking completely the provision of some service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
SYN-ACK and ACK packets are transported using IP,which is an
unreliable network protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Given sufficiently privileged access to the network handling code on a
computer system,it is difficult to create packets with a forged source
address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
A cyberslam is an application attack that consumes significant
resources,limiting the server's ability to respond to valid requests from
other users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
A DoS attack targeting application resources typically aims to overload
or crash its network handling software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Reflector and amplifier attacks use compromised systems running the
attacker's programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
The SYN spoofing attack targets the table of TCP connections on the
server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Slowloris is a form of ICMP flooding.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Using forged source addresses is known as _________.

A)source address spoofing
B)a three-way address
C)random dropping
D)directed broadcast
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
DoS attacks cause damage or destruction of IT infrastructures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The standard protocol used for call setup in VoIP is the ________ Protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
In both direct flooding attacks and ______ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.

A)SYN spoofing attacks
B)indirect flooding attacks
C)ICMP attacks
D)system address spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
A characteristic of reflection attacks is the lack of _______ traffic.

A)backscatter
B)network
C)three-way
D)botnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
In a _______ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

A)SYN flood
B)DNS amplification
C)poison packet
D)UDP flood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
During a ______ attack,the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system and when the intermediary responds,the response is sent to the target.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The four lines of defense against DDoS attacks are: attack prevention and preemption,attack detection and filtering,attack source traceback and identification and _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
_______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.

A)Application-based
B)System-based
C)Random
D)Amplification
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
_______ is a text-based protocol with a syntax similar to that of HTTP.

A)RIP
B)DIP
C)SIP
D)HIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
Requests and _______ are the two different types of SIP messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The best defense against broadcast amplification attacks is to block the use of _______ broadcasts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
In reflection attacks,the ______ address directs all the packets at the desired target and any responses to the intermediary.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.

A)HTTP
B)Reflection attacks
C)SYN flooding
D)Slowloris
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
When a DoS attack is detected,the first step is to _______.

A)identify the attack
B)analyze the response
C)design blocking filters
D)shut down the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A _______ flood refers to an attack that bombards Web servers with HTTP requests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______.

A)trailing
B)spidering
C)spoofing
D)crowding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.

A)three-way handshake
B)UDP flood
C)SYN spoofing attack
D)flash crowd
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
Modifying the system's TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows,allowing a new connection attempt to proceed is _______.

A)poison packet
B)slashdot
C)backscatter traffic
D)random drop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
A _____ is an action that prevents or impairs the authorized use of networks,systems,or applications by exhausting resources such as central processing units,memory,bandwidth,and disk space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
A ______ is a graphical puzzle used to attempt to identify legitimate human initiated interactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets,an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.