Ch4 Activities CSC 338

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

SYN cookies, RST cookies, and stack tweaking

A range of countermeasures can help defend against DoS attacks. What are three methods for protecting against SYN flood attacks?

2
New cards

Maximum voltage

All DoS attacks are predicated on overwhelming a system's workload capacity. Therefore, measuring the workload of a system is critical. Which of the following is not a valid way to define a computer's workload?

3
New cards

It will prevent an attack from propagating across network segments.

How can securing internal routers help protect against DoS attacks?

4
New cards

SYN flood attack

It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half open is a symptom of which type of attack?

5
New cards

Smurf attack

Juan is explaining various DoS attacks to security operators at his company. Which attack mentioned in this chapter causes a network to perform a DoS attack on one of its own senes!

6
New cards

Block all incoming ICMP packets

No attack mitigation strategy is perfect, and you need to allow at least some traffic into and out of your network, or else your network is of no use. What can you do with your firewall to defend against at least some DoS attacks?

7
New cards

Disallow all traffic that comes from untrusted sources

What can you do to your internal network routers to help defend against DoS attacks?

8
New cards

DDoS attack

What do you call a DoS attack launched from several machines simultaneously?

9
New cards

Distributed denial of service

What is the most common class of DoS attacks?

10
New cards

The attack must be sustained.

What is the most significant weakness in a DoS attack from the attacker's viewpoint?

11
New cards

SYN cookies

What is the name for a defense that depends on a hash being sent back to the requesting client?

12
New cards

Ping of death

What type of attack is dependent on sending packets that are too large for the server to handle?

13
New cards

RST cookies

What type of defense depends on sending the client an incorrect SYN/ACK?

14
New cards

Denial of service attack

When considering the various attacks that can be executed on your system, it is important to understand which attacks are most common. Of the following, which is one of the most common and simplest attacks on a system?

15
New cards

Computers can handle only a finite load.

While there are a wide range of different ways to execute a Dos altack, they all are predicaes on the same idea. What is the basic concept behind a DoS attack?

16
New cards

Stack tweaking

You are attempting to explain various DoS attacks to a new security technician. You want to make sure she can differentiate between these different attacks and notice the signs of a specific attack. What type of defense depends on changing the server so that unfinished hand-shaking times out sooner?

17
New cards

Many denial of service attacks are conducted by using a Trojan horse to get an unsuspecting machine to execute the DoS attack.

You are trying to identify all potential DoS attack vectors. In doing so, you hope to provide mitigation for each of these attack vectors. Why will protecting against Trojan horse attacks reduce DoS attacks?

18
New cards

DDoS

You want to make sure your team can identify the various DoS attack vectors. What type of attack uses the victim's own network routers to perform a DoS attack on the target?

19
New cards

CAPTCHA

If you are a website developer and concerned about DoS attacks, what is one mitigation techniqueyou can implenet in the website itself?

20
New cards

DDoS

Dorothy is network administrator. Her system has been experiencing an attack that is using bots to send fake requests to the cloud resources her company uses. This is causing disruption of the availability of these resources. How is this attack best described?