1/19
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. T/F?
True
DoS attacks cause damage or destruction of IT infrastructures. T/F?
False
Given sufficiently privileged access to the network handling code on a computer system, it is difficult to create packets with a forged source address. T/F?
False
The attacker needs access to a high-volume network connection for a SYN spoof attack. T/F?
False
The best defense against being an unwitting participant in a DDoS attack is to prevent your systems from being compromised. T/F?
True
Reflector and amplifier attacks use compromised systems running the attacker’s programs. T/F?
False
There is very little that can be done to prevent a flash crowd. T/F?
True
______ relates to the capacity of the network links connecting a server to the wider Internet.
Network bandwidth
A ______ triggers a bug in the system’s network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
poison packet
TCP uses the _ to establish a connection.
Three-way handshake
_ is a text-based protocol with a syntax similar to that of HTTP.
SIP
Bots starting from a given HTTP link and then following all links on the provided website in a recursive way is called _.
Spidering
In a _ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
DNS amplification
Modifying the system’s TCP/IP network code to selectively drop an entry for an incomplete connection from the TCP connections table when it overflows, allowing a new connection attempt to proceed is _.
Random drop
_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.
Flooding
A _ flood refers to an attack that bombards Web servers with HTTP requests.
HTTP
During a ______ attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system, and when the intermediary responds, the response is sent to the target.
reflection
The best defense against broadcast amplification attacks is to block the use of _ broadcasts.
IP-directed
A ______ is a graphical puzzle used to attempt to identify legitimate human-initiated interactions.
captcha
If an organization is dependent on network services it should consider mirroring and __ these servers over multiple sites with multiple network connections.
replicating