2-1 Flashcards
any attack that aims to deprive legitimate users of the use of the target system
dos
many experts feel the __________ is so common because its attacks are fairly easy to execute
dos
the underlying concept behind any DOS attack is that __________
every system has limits
typing /h or ping /? will show you all the options for the
ping command
anytime you you change the configuraton file you must stop the apache server and _______
restart it
apache program will allow you to turn a node into a
server
one way to verify that the designated computer is running as a server is to open your browser and type the target machines __________
ip address
ping option ___ will determine how long I’m milliseconds a ping utility will wait for response from its target. enter ___ and the compute will not wait at all
-w // -0
the ___ option instructs the ping utility to keep sending packets until told to stop. adding the _____ will alow you to change the size of the packet you send
-t // -1
flood the target machine with so many requests that it can no longer respond
dos attack
getting various means, possibly through the use of a virus to flood a target machine with ping messages
ping flood
a dos attack launched from several different machines is called a ______. its now the most common form of Dos
DdoS
2 reasons why DDOS is becoming more popular
overloading a system is easier with multiple machines
it allows the attacker to launch the attack from someone elses machine
session established packets include a ____ field that id’s the sequence in the message exchange
syn
in a ________ an attacker sends a number of connection requests very quickly and then fails to respond to the reply that is sent back by the server.
syn flood