Ethical 11 Flashcards
When a DDoS attack starts, which forensic tool can be used to stop the system from being flooded by packets?
Zombie Zapper tool
A client has asked you for assistance with deploying DDoS countermeasures. What recommendations are valid?
- Egress filtering should be used to scan IP packets going out of a network, and should only be forwarded if packets meet predefined specifications.
- Handlers should be quickly detected and disabled to disrupt DDoS attacks.
A client’s web host is currently experiencing a massive DoS attack from a specific source IP. What countermeasure(s) could be used to mitigate the effects of the DoS attack while minimizing the inconvenience to end users?
- Routers can be configured to drop packets with a specific destination address.
- ISPs can drop the transmission of falsely addressed packets within their controlled networks.
Which tool used to create a DoS attack targets a vulnerability in Windows networking code that allows remote attackers to consume 100% of the CPU time?
Jolt2
Your client has asked you to implement a decoy network with the intent to steer attacks away from more sensitive networks. What type of honeypot system is this?
High-interaction honeypot
In which type of attack does an attacker typically use a botnet to send a large number of queries to open DNS servers?
Reflective DNS attack
Once Agobot is in the system directory, where does it place autorun entries in the registry?
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
A SYN flood is an example of what mode of DoS attack?
Network Connectivity
In which attack does an attacker deliberately sends an ICMP echo packet of more than the 65,536 bytes?
Ping of death
In the second step of an Agobot attack, the Agobots can use network shares to infect other systems. Which method is the Agobot employing in this spreading stage?
Via the network
Which of the following are software applications that run automated tasks over the internet?
Bots
What two DDoS utilities are IRC based, and both provide the ability to use SYN attacks?
Knight
Kaiten
Regarding an IRC based DDoS model versus an agent/handler model, what statements are accurate?
The IRC method enables simple file sharing capabilities for agent code allotment.
Legitimate IRC ports can be utilized for communication with agents.
Which method can be an effective countermeasure against SYN attacks?
Decreasing the SYN RECEIVED time-out period
A computer on your client’s network has been detected as running listening services on port 6667 and 33270. What DDoS tool is being utilized?
Trinity