Ethical 11 Flashcards

1
Q

When a DDoS attack starts, which forensic tool can be used to stop the system from being flooded by packets?

A

Zombie Zapper tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A client has asked you for assistance with deploying DDoS countermeasures. What recommendations are valid?

A
  • Egress filtering should be used to scan IP packets going out of a network, and should only be forwarded if packets meet predefined specifications.
  • Handlers should be quickly detected and disabled to disrupt DDoS attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A client’s web host is currently experiencing a massive DoS attack from a specific source IP. What countermeasure(s) could be used to mitigate the effects of the DoS attack while minimizing the inconvenience to end users?

A
  • Routers can be configured to drop packets with a specific destination address.
  • ISPs can drop the transmission of falsely addressed packets within their controlled networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which tool used to create a DoS attack targets a vulnerability in Windows networking code that allows remote attackers to consume 100% of the CPU time?

A

Jolt2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your client has asked you to implement a decoy network with the intent to steer attacks away from more sensitive networks. What type of honeypot system is this?

A

High-interaction honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which type of attack does an attacker typically use a botnet to send a large number of queries to open DNS servers?

A

Reflective DNS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Once Agobot is in the system directory, where does it place autorun entries in the registry?

A

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A SYN flood is an example of what mode of DoS attack?

A

Network Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In which attack does an attacker deliberately sends an ICMP echo packet of more than the 65,536 bytes?

A

Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the second step of an Agobot attack, the Agobots can use network shares to infect other systems. Which method is the Agobot employing in this spreading stage?

A

Via the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are software applications that run automated tasks over the internet?

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two DDoS utilities are IRC based, and both provide the ability to use SYN attacks?

A

Knight

Kaiten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Regarding an IRC based DDoS model versus an agent/handler model, what statements are accurate?

A

The IRC method enables simple file sharing capabilities for agent code allotment.

Legitimate IRC ports can be utilized for communication with agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which method can be an effective countermeasure against SYN attacks?

A

Decreasing the SYN RECEIVED time-out period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer on your client’s network has been detected as running listening services on port 6667 and 33270. What DDoS tool is being utilized?

A

Trinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of attack uses the TCP three-way handshake to create incomplete connections?

A

SYN

17
Q

What DoS tool can be used to generate random packets with spoofed source IPs?

A

Nemesy

18
Q

You are attempting to perform a DDoS attack utilizing forged UDP packets to link the echo service on one target machine with the character generator on another machine. What type of DDoS attack is this?

A

Fraggle attack

19
Q

What are the “secondary victims” of a DDoS attack called?

A

Zombies

20
Q

Which registry entry can be used to automatically start a program when Windows boots?

A

HKLM\Software\Microsoft\Windows\CurrentVersion\Run