• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP)
addresses/names with the intent of diverting traffic?
A. Network aliasing
B. Domain Name Server (DNS) poisoning
C. Reverse Address Resolution Protocol (ARP)
D. Port scanning
Answer: B
Which of the following identifies the first phase of a Distributed Denial of Service attack?
A. Establishing communications between the handler and agent.
B. Disrupting the normal traffic to the host.
C. Disabling the router so it cannot filter traffic.
D. Compromising as many machines as possible.
Answer: D
Why are packet filtering routers NOT effective against mail bomb attacks?
A. The bomb code is obscured by the message encoding algorithm.
B. Mail bombs are polymorphic and present no consistent signature to filter on.
C. Filters do not examine the data portion of a packet.
D. The bomb code is hidden in the header and appears as a normal routing information.
Answer: C
Which one of the following correctly identifies the components of a Distributed Denial of Service Attack?
A. Node, server, hacker, destination
B. Client, handler, agent, target
C. Source, destination, client, server
D. Attacker, proxy, handler, agent
Answer: B
Another form of DoS. A distributed denial of service occurs when the attacker compromises
several systems to be used as launching platforms against one or more victims. The
compromised systems used in the attacks are often called claves or zombies.
Which one of the following attacks will pass through a network layer intrusion detection system undetected?
A. A teardrop attack
B. A SYN flood attack
C. A DNS spoofing attack
D. A test.cgi attack
Answer: D
What is called an attach where the attacker spoofs the source IP address in an ICMP
ECHO broadcast packet so it seems to have originated at the victim's system, in order to
flood it with REPLY packets?
A.) SYN flood attack
B.) Smurf attack
C.) Ping of Dead Attack
D.) Denial of Service (DOS) Attack
Answer: B
What attack is primarily based on the fragmentation implementation of IP and large
ICMP packet size?
A. Exhaustive
B. Brute force
C. Ping of Death
D. Spoofing
Answer: C
Explanation:
Ping of Death -- This exploit is based on the fragmentation implementation of IP
whereby large packets are reassembled and can cause machines to crash. 'Ping of Death
Land attack attacks a target by:
A. Producing large volume of ICMP echos.
B. Producing fragmented IP packets.
C. Attacking an established TCP connection.
D. None of the choices.
Answer: C
Explanation:
Land.c. attack -- Attacks an established TCP connection.
What attack is primarily based on the fragmentation implementation of IP?
A. Teardrop
B. Exhaustive
C. Spoofing
D. Brute force
Answer: A
Explanation:
Teardrop attack - This is based on the fragmentation implementation of IP whereby
reassembly problems can cause machines to crash
A stack overflow attack that "crashes" a Transmission Control Protocol/Internet Protocol (TCP/IP) service
daemon
can result in a serious security breach because the
A. Process does not implement proper object reuse.
B. Process is executed by a privileged entity.
C. Network interface becomes promiscuous.
D. Daemon can be replaced by a trojan horse
Answer: B
A. Communication based on random challenge.
B. Communication based on face to face contact.
C. Communication based on token.
D. Communication based on asymmetric encryption.
Answer: D
Which one of the following is concerned with masking the frequency, length, and
origin-destination patterns of the communications between protocol entities?
A. Masking analysis
B. Protocol analysis
C. Traffic analysis
D. Pattern analysis
Answer: C