1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
SYN cookies, RST cookies, and stack tweaking
A range of countermeasures can help defend against DoS attacks. What are three methods for protecting against SYN flood attacks?
Maximum voltage
All DoS attacks are predicated on overwhelming a system's workload capacity. Therefore, measuring the workload of a system is critical. Which of the following is not a valid way to define a computer's workload?
It will prevent an attack from propagating across network segments.
How can securing internal routers help protect against DoS attacks?
SYN flood attack
It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half open is a symptom of which type of attack?
Smurf attack
Juan is explaining various DoS attacks to security operators at his company. Which attack mentioned in this chapter causes a network to perform a DoS attack on one of its own senes!
Block all incoming ICMP packets
No attack mitigation strategy is perfect, and you need to allow at least some traffic into and out of your network, or else your network is of no use. What can you do with your firewall to defend against at least some DoS attacks?
Disallow all traffic that comes from untrusted sources
What can you do to your internal network routers to help defend against DoS attacks?
DDoS attack
What do you call a DoS attack launched from several machines simultaneously?
Distributed denial of service
What is the most common class of DoS attacks?
The attack must be sustained.
What is the most significant weakness in a DoS attack from the attacker's viewpoint?
SYN cookies
What is the name for a defense that depends on a hash being sent back to the requesting client?
Ping of death
What type of attack is dependent on sending packets that are too large for the server to handle?
RST cookies
What type of defense depends on sending the client an incorrect SYN/ACK?
Denial of service attack
When considering the various attacks that can be executed on your system, it is important to understand which attacks are most common. Of the following, which is one of the most common and simplest attacks on a system?
Computers can handle only a finite load.
While there are a wide range of different ways to execute a Dos altack, they all are predicaes on the same idea. What is the basic concept behind a DoS attack?
Stack tweaking
You are attempting to explain various DoS attacks to a new security technician. You want to make sure she can differentiate between these different attacks and notice the signs of a specific attack. What type of defense depends on changing the server so that unfinished hand-shaking times out sooner?
Many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack.
You are trying to identify all potential DoS attack vectors. In doing so, you hope to provide mitigation for each of these attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?
DDoS
You want to make sure your team can identify the various DoS attack vectors. What type of attack uses the victim's own network routers to perform a DoS attack on the target?
CAPTCHA
If you are a website developer and concerned about DoS attacks, what is one mitigation techniqueyou can implenet in the website itself?
DDoS
Dorothy is network administrator. Her system has been experiencing an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availability of these resources. How is this attack best described?