Ch. 7: DDOS Attacks Flashcards

1
Q

SYN spoofing attack targets ________.

a. Email service
b. TCP connections table
c. DNS service
d. None of the above

A

Correct Answer: B

Stallings, 4th Edition, Section 7.1, page 227

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a poison packet?

A. A packet that triggers a bug in the network software and makes it crash.
B. A packet that contains the signature of a virus.
C. A packet that infects other packets in the network buffer.
D. A packet that redirects other packets to a malicious target.

A

Correct Answer: A

p. 226

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cyber slam?

A. Cyber slam is a made up term.
B. Another name for a DDoS attack.
C. A firewall packet strategy that helps to thwart a DoS or DDoS attack.
D. A large number of queries that severely load a server.

A

Correct Answer: D

p. 226

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If an attacker directs a large number of forged requests to a server, what type of attack is being made?

A. Slowloris
B. Source address spoofing
C. SYN spoofing
D. Reflector
E. Amplifier
A

Correct Answer: C

p. 230

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F: ICMP flood attacks remain common because some ICMP packets are critical to normal network behavior and cannot be filtered.

A

True

p. 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a TCP SYN flood attack and a SYN spoofing attack?

A. There is no difference, they are synonymous.
B. The difference is in the volume of packets.
C. SYN spoofing works with UDP only.
D. TCP SYN flood attacks don’t use spoofed source addresses.

A

Correct Answer: B

TCP SYN flood attacks may or may not use spoofed addresses, but the difference is in the volume of packets sent, meant to overwhelm the server. The SYN spoofing attack is meant to overwhelm the server in sending SYN-ACK messages to spoofed (preferably not invalid) addresses.

p. 231, 234

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack is based on sending a large number of INVITE requests with spoofed IP addresses to a server?

A. Reflection attack
B. Smurf attack
C. Slashdot attack
D. SIP flood attack

A

Correct Answer: D

p. 236, 241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T/F: The best defense against a reflection attack is to not allow directed broadcasts to be routed into a network.

A

False

The description is the best defense for an Amplification attack. To defend against a reflection attack, filtering to block spoofed-source packets.

p. 241 - 242

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: A characteristic of reflection attacks is the lack of backscatter traffic.

A

True

p. 241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some ways to prevent SYN spoofing attacks?

A. Use SYN cookies
B. Modify the size of the TCP connections table or timeout period
C. Impose rate limits on network links
D. Use selective or random dropping of TCP table entries
E. All of the above
F. None of the above

A

Correct Answer: E

p. 246

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F: Slowloris uses a ping flood via ICMP echo request packets.

A

False

That is the smurf attack. Slowloris exploits servers that use multiple threads by sending multiple incomplete connections (by not including the terminating newline sequence) to a server.

p. 238, 242

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: In a TCP spoofing attack, attacker ideally wishes to use addresses that will not respond to the SYN-ACK with a RST.

A

True

p. 231

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A recursive HTTP flood attack is also known as what?

A. a Fraggle attack
B. a Delayed Binding attack
C. a Spidering attack
D. a SIP flood

A

Correct Answer: C

bots start from a given HTTP link and then follows all links on the provided website in a recursive way. This is also called spidering.

p. 237

How well did you know this?
1
Not at all
2
3
4
5
Perfectly