Computer Security Quiz 7

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. T/F?

True

2
New cards

DoS attacks cause damage or destruction of IT infrastructures. T/F?

False

3
New cards

Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address. T/F?

False

4
New cards

The attacker needs access to a high-volume network connection for a SYN spoof attack. T/F?

False

5
New cards

The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. T/F?

True

6
New cards

Reflector and amplifier attacks use compromised systems running the attacker’s programs. T/F?

False

7
New cards

There is very little that can be done to prevent a flash crowd. T/F?

True

8
New cards

______ relates to the capacity of the network links connecting a server to the wider Internet.

Network bandwidth

9
New cards

A ______ triggers a bug in the system’s network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.

poison packet

10
New cards

TCP uses the _ to establish a connection.

Three-way handshake

11
New cards

_ is a text-based protocol with a syntax similar to that of HTTP.

SIP

12
New cards

Bots starting from a given HTTP link and then following all links on the provided website in a recursive way is called _.

Spidering

13
New cards

In a _ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.

DNS amplification

14
New cards

Modifying the system’s TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _.

Random drop

15
New cards

_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.

Flooding

16
New cards

A _ flood refers to an attack that bombards Web servers with HTTP requests.

HTTP

17
New cards

During a ______ attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system, and when the intermediary responds, the response is sent to the target.

reflection

18
New cards

The best defense against broadcast amplification attacks is to block the use of _ broadcasts.

IP-directed

19
New cards

A ______ is a graphical puzzle used to attempt to identify legitimate human-initiated interactions.

captcha

20
New cards

If an organization is dependent on network services it should consider mirroring and __ these servers over multiple sites with multiple network connections.

replicating