Module 10 - Denial-of-Service

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Which of the following are common types of DoS attacks? (Select all that apply)

a. SYN Flood

b. SQL Injection

c. UDP Flood

d. ICMP Flood

a. SYN Flood

c. UDP Flood

d. ICMP Flood

2
New cards

Which of the following tools are commonly used for DoS attacls? (Select all that apply)

a. LOIC

b. Metasploit

c. Slowloris

d. Wireshark

a. LOIC

c. Slowloris

3
New cards

What are common countermeasures against DoS attacks? (Select all that apply)

a. Web Applicaiton Firewalls (WAF)

b. Disabiling all firewalls

c. Intrusion Prevention Systems (IPS)

d. Rate Limiting

a. Web Applicaiton Firewalls (WAF)

c. Intrusion Prevention Systems (IPS)

d. Rate Limiting

4
New cards

Which of the following describe volumetric DoS attacks (Select all that apply)

a. Exhausting bandwidth with high traffic volume

b. Exploiting protocol vulnerabilities

c. Using botnets to amplify attack size

d. Sending oversized ICMP packets

a. Exhausting bandwidth with high traffic volume

d. Sending oversized ICMP packets

5
New cards

What are symptoms of a DoS attack? (Select all that apply)

a. Slow network performance

b. Unauthorized file modifications

c. Unavailable web services

d. High CPU or memory usage on servers

a. Slow network performance

c. Unavailable web services

d. High CPU or memory usage on servers

6
New cards

Which of the following techniques can help prevent a SYN flood attack? (Select all that apply)

a. Enabling SYN cookies

b. Increasing open connection limits

c. Rate limiting TCP SYN requests

d. Using a Web Application Firewall (WAF)

a. Enabling SYN cookies

b. Increasing open connection limits

c. Rate limiting TCP SYN requests

7
New cards

What are common targets of DoS attacks? (Select all that apply)

a. Online gaming servers

b. Government websites

c. Offline storage devices

d. Banking institutions

a. Online gaming servers

b. Government websites

d. Banking institutions

8
New cards

Which types of attacks fall under application-layer DoS? (Select all that apply)

a. HTTP Flood

b. Slowloris Attack

c. SQL Injection

d. R-U-Dead-Yet (RUDY)

a. HTTP Flood

b. Slowloris Attack

d. R-U-Dead-Yet (RUDY)

9
New cards

How can attackers create a botnet for a DDoS attack? (Select all that apply)

a. Infecting devices with malware

b. Using open proxies to relay requests

c. Gaining remote access to IoT devices

d. Encrypting communication to prevent detection

a. Infecting devices with malware

b. Using open proxies to relay requests

c. Gaining remote access to IoT devices

10
New cards

Which network security measures help mitigate DDoS attacks? (Select all that apply)

a. Anycast

b. Intrusion Detection Systems (IDS)

c. Using a VPN for all traffic

d. Blackhole Routing

a. Anycast

b. Intrusion Detection Systems (IDS)

d. Blackhole Routing