Looks like no one added any tags here yet for you.
Which of the following are common types of DoS attacks? (Select all that apply)
a. SYN Flood
b. SQL Injection
c. UDP Flood
d. ICMP Flood
a. SYN Flood
c. UDP Flood
d. ICMP Flood
Which of the following tools are commonly used for DoS attacls? (Select all that apply)
a. LOIC
b. Metasploit
c. Slowloris
d. Wireshark
a. LOIC
c. Slowloris
What are common countermeasures against DoS attacks? (Select all that apply)
a. Web Applicaiton Firewalls (WAF)
b. Disabiling all firewalls
c. Intrusion Prevention Systems (IPS)
d. Rate Limiting
a. Web Applicaiton Firewalls (WAF)
c. Intrusion Prevention Systems (IPS)
d. Rate Limiting
Which of the following describe volumetric DoS attacks (Select all that apply)
a. Exhausting bandwidth with high traffic volume
b. Exploiting protocol vulnerabilities
c. Using botnets to amplify attack size
d. Sending oversized ICMP packets
a. Exhausting bandwidth with high traffic volume
d. Sending oversized ICMP packets
What are symptoms of a DoS attack? (Select all that apply)
a. Slow network performance
b. Unauthorized file modifications
c. Unavailable web services
d. High CPU or memory usage on servers
a. Slow network performance
c. Unavailable web services
d. High CPU or memory usage on servers
Which of the following techniques can help prevent a SYN flood attack? (Select all that apply)
a. Enabling SYN cookies
b. Increasing open connection limits
c. Rate limiting TCP SYN requests
d. Using a Web Application Firewall (WAF)
a. Enabling SYN cookies
b. Increasing open connection limits
c. Rate limiting TCP SYN requests
What are common targets of DoS attacks? (Select all that apply)
a. Online gaming servers
b. Government websites
c. Offline storage devices
d. Banking institutions
a. Online gaming servers
b. Government websites
d. Banking institutions
Which types of attacks fall under application-layer DoS? (Select all that apply)
a. HTTP Flood
b. Slowloris Attack
c. SQL Injection
d. R-U-Dead-Yet (RUDY)
a. HTTP Flood
b. Slowloris Attack
d. R-U-Dead-Yet (RUDY)
How can attackers create a botnet for a DDoS attack? (Select all that apply)
a. Infecting devices with malware
b. Using open proxies to relay requests
c. Gaining remote access to IoT devices
d. Encrypting communication to prevent detection
a. Infecting devices with malware
b. Using open proxies to relay requests
c. Gaining remote access to IoT devices
Which network security measures help mitigate DDoS attacks? (Select all that apply)
a. Anycast
b. Intrusion Detection Systems (IDS)
c. Using a VPN for all traffic
d. Blackhole Routing
a. Anycast
b. Intrusion Detection Systems (IDS)
d. Blackhole Routing