Kasandra Angermeier CNC 142 Chapter 11: Denial of Service Attacks 1. What is one of the most common and simplest attacks on a system? ~ (A) Denial of Service Attack 2. Which of the following is not a valid way to define a computer’s workload? ~ (C) Maximum Voltage 3. If you want to learn more check out downloadclassnotes
Don't forget about the age old question of socialization into the police subculture commences with new recruits.
If you want to learn more check out beale management has a noncontributory
If you want to learn more check out xwwee
We also discuss several other topics like woodmier lawn products
Don't forget about the age old question of should valleck report a liability in addition to the note, and should anything be added to the disclosure note itself?
What do you call a DoS launched from several machines simultaneously? ~ (D) DDoS Attack 4. Leaving a connection half open is referred to as what? ~ (B) Partial Attack 5. What is the basic mechanism behind a DoS attack? ~ (C) Computers cannot handle large volumes of TCP traffic. 6. What is the most significant weakness in a DoS attack from the attacker’s viewpoint? ~ (D) The attack must be sustained. 7. What is the most common class of DoS attacks? ~ (A) Distributed Denial of Service Attacks 8. What are three methods for protecting against SYN flood attacks? ~ (A) SYN cookies, RST cookies, Stack Tweaking 9. Which attack mentioned in this chapter causes a network to perform a DoS on one of its own servers? ~ (C) Smurf Attack 10. A defense that depends on a hash encryption being sent back to the requesting client is called what? ~ (A) Stack Tweaking 11. What type of defense depends on sending the client an incorrect SYNACK? ~ (B) RST cookies 12. What type of defense depends on changing the server so that unfinished handshaking times out sooners? ~ (A) Stack Tweaking 13. What type of attack is dependent on sending packets too large for the server to handle? ~ (A) Ping of Death 14. What type of attack uses internet routers to perform a DoS attack? ~ (D) DDoS Attack 15. Which of the following is an example of a DDoS Attack? ~ (A) MyDoom virus. 16. How can securing internal routers help to protect against DoS attacks? ~ (D) It will prevent an attack from propagating across network segments. 17. What can you do to your internal network routers to help defend against DoS attacks? ~ (B) Disallow all traffic that comes from outside the network. 18. Which of the following was rated by many to be the fastest growing virus on the internet? ~ (A) MyDoom Virus 19. What can you do with your firewall to defend against DoS attacks? ~ (D) Block all incoming ICMP packets. 20. Why will protecting against Trojan horse attacks reduce DoS attacks? ~ (B) Because if you can stop a Trojan horse attack, you will also stop DoS attacks.