978-0840020932 Chapter 11

subject Type Homework Help
subject Pages 4
subject Words 859
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 11: Denial-of-Service Attacks
TRUE/FALSE
1. Some vulnerabilities cannot be closed by patching because there is an inherent bandwidth limit or active
connection limit on all physical equipment and all software.
2. The process table in UNIX permits a virtually infinite number of entries.
3. Most legitimate Ping utilities do not allow you to send a ping of less than 64 KB.
4. Computers that are connected to the Internet utilize DNS to resolve URLs.
5. ICMP is used to handle errors and exchange control messages on a network.
MULTIPLE CHOICE
1. A(n) ____ occurs when the sysadmin has allowed the system to perform a variety of services without
considering the system’s limitations.
a.
involuntary DoS
c.
isolated DoS
b.
distributed DoS
d.
voluntary DoS
2. ____ attacks consume the limited resources of a computer or a network by transmitting a large number
of packets as quickly as possible.
a.
Software
c.
Flood
b.
Isolated
d.
Void
3. ____ attacks exploit the existing software weaknesses. The effect is either degraded performance or
crashes on the victim server.
a.
Software
c.
Voluntary
b.
Flood
d.
Isolated
4. The ____ utility is used to determine if a specific machine located at a specific IP address is online.
a.
Echo
c.
ps
b.
Ping
d.
Alive
page-pf2
5. In a ____ attack, a hacker sends to the target computer a packet that has the identical source and
destination IP address as that of the target computer.
a.
DNS overflow
c.
Land
b.
Teardrop
d.
Chargen
COMPLETION
1. A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the
target of your attack.
2. ____________________ is a historical DoS attack in which the hacker uses the Ping utility to acquire
access to a system.
3. ______________________________ is a database that maps domain names to IP addresses.
4. ____________________ attacks are like SMURF DoS attacks, but instead of using ICMP packets, they
use UDP packets.
5. A(n) ____________________ is a network of robot, or zombie, computers, which can harness their
collective power to do considerable damage or send out huge amounts of junk e-mail.
SHORT ANSWER
1. What are the main targets of DoS attacks and what do the attacks accomplish?
page-pf3
2. Describe an example of a voluntary DoS attack.
3. Under what conditions can a flood attack occur?
4. Describe an example of a DNS spoofing attack.
5. What are the main characteristics of Trinoo?
page-pf4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.