Chapter 7 (DOS attacks) Flashcards

1
Q

What is a DOS attack

A

An action which prevents or impairs the authoirzed use of networks, systems, or applications by exausting resources such as CPU, memory, bandwidth, and disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 categories of resources that can be attacked during a DOS attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why are source ip addresses spoofed

A

makes identifying attacking systems harder to identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does SYN spoofing do

A

attacks ability of a server to respond to future connection requests by overflowing tables used to manage them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a 3 way TCP connection handshake look like

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how are flooding attacks classified

A

based on network protocol used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are flooding attacks intent

A

overload the network capacity on some link to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a distributed denial of service attack (DDOS)

A

uses multiple systems to generate attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an http flood

A

attack that bombards web servers with http requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is spidering

A

bots start at a given http link and follows all links on page recursivly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a slowloris attack

A

it attempts to monopolize by sending http requests that never complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a reflection attack

A

attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system

when intermediary responds, the response is sent to the target

“reflects” the attack off the intermediary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a dns amplification attack

A

Exploit DNS behavior to convert a small request to a much larger response (amplification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the way to prevent dns amplification attacks

A

do not allow spoofed source addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are these examples of

A

ways to prevent DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly