×
Log in to StudySoup
Get Full Access to LLCC - CNC 142 - Class Notes - Week 11
Join StudySoup for FREE
Get Full Access to LLCC - CNC 142 - Class Notes - Week 11

Already have an account? Login here
×
Reset your password

LLCC / cncsp / CNC 142 / cnc attack

cnc attack

cnc attack

Description

School: Lincoln Land Community College
Department: cncsp
Course: Intro to Ethics, Security and Networks
Professor: Jan marsaglia
Term: Spring 2017
Tags: Computer Science, Computer, networks, ethics, and Security
Cost: 25
Name: Intro to Ethics and Security Week 11
Description: These notes cover the information presented in the text for chapter 11, week 11.
Uploaded: 02/22/2017
2 Pages 181 Views 0 Unlocks
Reviews



Leaving a connection half open is referred to as what?




What do you call a DoS launched from several machines simultaneously?




What is one of the most common and simplest attacks on a system?



Kasandra Angermeier  CNC 142 Chapter 11: Denial of Service Attacks  1. What is one of the most common and simplest attacks on a system? ~ (A) Denial of Service Attack  2. Which of the following is not a valid way to define a computer’s workload?  ~ (C) Maximum Voltage  3. If you want to learn more check out downloadclassnotes
Don't forget about the age old question of socialization into the police subculture commences with new recruits.
If you want to learn more check out beale management has a noncontributory
If you want to learn more check out xwwee
We also discuss several other topics like woodmier lawn products
Don't forget about the age old question of should valleck report a liability in addition to the note, and should anything be added to the disclosure note itself?
What do you call a DoS launched from several machines simultaneously?  ~ (D) DDoS Attack 4. Leaving a connection half open is referred to as what?  ~ (B) Partial Attack 5. What is the basic mechanism behind a DoS attack? ~ (C) Computers cannot handle large volumes of TCP traffic.  6. What is the most significant weakness in a DoS attack from the attacker’s viewpoint?  ~ (D) The attack must be sustained.  7. What is the most common class of DoS attacks?  ~ (A) Distributed Denial of Service Attacks 8. What are three methods for protecting against SYN flood attacks?  ~ (A) SYN cookies, RST cookies, Stack Tweaking  9. Which attack mentioned in this chapter causes a network to perform a DoS on one of its  own servers?  ~ (C) Smurf Attack 10. A defense that depends on a hash encryption being sent back to the requesting client is  called what? ~ (A) Stack Tweaking 11. What type of defense depends on sending the client an incorrect SYNACK?  ~ (B) RST cookies  12. What type of defense depends on changing the server so that unfinished handshaking  times out sooners?  ~ (A) Stack Tweaking 13. What type of attack is dependent on sending packets too large for the server to handle?  ~ (A) Ping of Death 14. What type of attack uses internet routers to perform a DoS attack?  ~ (D) DDoS Attack 15. Which of the following is an example of a DDoS Attack?  ~ (A) MyDoom virus.  16. How can securing internal routers help to protect against DoS attacks?  ~ (D) It will prevent an attack from propagating across network segments.  17. What can you do to your internal network routers to help defend against DoS attacks?  ~ (B) Disallow all traffic that comes from outside the network.  18. Which of the following was rated by many to be the fastest growing virus on the internet? ~ (A) MyDoom Virus 19. What can you do with your firewall to defend against DoS attacks?  ~ (D) Block all incoming ICMP packets.  20. Why will protecting against Trojan horse attacks reduce DoS attacks?  ~ (B) Because if you can stop a Trojan horse attack, you will also stop DoS attacks.  

Page Expired
5off
It looks like your free minutes have expired! Lucky for you we have all the content you need, just sign up here