2-1 Flashcards
any attack that aims to deprive legitimate users of the use of the target system
dos
many experts feel the __________ is so common because its attacks are fairly easy to execute
dos
the underlying concept behind any DOS attack is that __________
every system has limits
typing /h or ping /? will show you all the options for the
ping command
anytime you you change the configuraton file you must stop the apache server and _______
restart it
apache program will allow you to turn a node into a
server
one way to verify that the designated computer is running as a server is to open your browser and type the target machines __________
ip address
ping option ___ will determine how long I’m milliseconds a ping utility will wait for response from its target. enter ___ and the compute will not wait at all
-w // -0
the ___ option instructs the ping utility to keep sending packets until told to stop. adding the _____ will alow you to change the size of the packet you send
-t // -1
flood the target machine with so many requests that it can no longer respond
dos attack
getting various means, possibly through the use of a virus to flood a target machine with ping messages
ping flood
a dos attack launched from several different machines is called a ______. its now the most common form of Dos
DdoS
2 reasons why DDOS is becoming more popular
overloading a system is easier with multiple machines
it allows the attacker to launch the attack from someone elses machine
session established packets include a ____ field that id’s the sequence in the message exchange
syn
in a ________ an attacker sends a number of connection requests very quickly and then fails to respond to the reply that is sent back by the server.
syn flood
each connection request sets asside resources to handle the ___________ to establish the connection
handshake