This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Chapter 11: Denial-of-Service Attacks
1. What is a DoS attack and what makes it different from a DDoS attack?
2. If your network is experiencing a SMURF attack, what is the best response?
3. What is the best plan to prevent DDoS attacks?
4. What kinds of attacks could be classified as flood DoS attacks?
5. What kinds of attacks could be classified as software DoS attacks?
6. What kinds of attacks could be classified as isolated DoS attacks?
7. What kinds of attacks could be classified as distributed DoS attacks?
8. What kinds of attacks could be classified as preventable DoS attacks?
9. What kinds of attacks could be classified as non-preventable DoS attacks?
10. Where would a TCP SYN attack appear in the attack matrix?
11. Where would a SMURF attack appear in the attack matrix?
12. Where would a Fraggle attack appear in the attack matrix?
13. Can a malfunctioning Ethernet card cause a DoS condition?
14. Can a misconfigured firewall cause a DoS condition?
15. Can a coworker cause a DoS condition accidentally?
Indicate whether the sentence or statement is true or false.
16. _______ DoS attacks are not possible to mount from a dial-up Internet connection.
17. _______ Some DoS attacks are caused by honest mistakes.
18. _______ Trinoo is a tool for detecting DDoS attacks.
19. _______ The Ping of Death is unstoppable when used against a Windows NT 3.1 machine.
20. _______ The machines most likely to be used to perform a Ping of Death have been retired or
updated to operating systems that do not allow an illegal enlarged packet to be sent.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.