L7: Adv. Network Monitoring Flashcards

1
Q

A bot is often called a:

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnets account for more than 95% of all spam.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All distributed denial of service (DDoS) attacks are done through botnets.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnets are often set-up for short-term uses.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A coordinated group of malware instances that are controlled via C&C channels is called a:

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following behaviors are indicative of botnets?

  • Linking to an established C&C server
  • Generating Internet Relay Chat (IRC) traffic using a specific range of ports
  • Generating DNS requests
  • Generating SMTP emails/traffic
    Reducing workstation performance/internet access to the level that it is noticeable by users
A
  • Linking to an established C&C server
  • Generating Internet Relay Chat (IRC) traffic using a specific range of ports
  • Generating SMTP emails/traffic
    Reducing workstation performance/internet access to the level that it is noticeable by users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can botnets do to evade C-plane clustering?

A

Manipulate communication patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can botnets do to evade A-plane clustering?

A

Perform slow spamming

Use undetectable activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should be considered in order to identify the source (perpetrator) of an APT attack?

A
Source IP
Coding style of Malware
Inclusion of Special Libraries
Motives of the attack
Language encoding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly