Module 10 - Denial-of-Service Flashcards

1
Q
  • An attack on a computer or network that reduces, restricts, or prevents accessibility of system resources to its legitimate users.
  • Attackers flood the victim system with non-legitimate service requests or traffic to overload its resources.
A

Denial-of-Service (DoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • A coordinated attack which involves a multitude of compromised systems (Botnet) attacking a single target; thereby causing denail of service for users of the targeted system.
  • 2 or more computers attacking a computer or network.
A

Distributed Denail-of-Service (DDoS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

large volumes of ICMP

DoS/DDoS Attack Techniques:

A type of attack in which attackers send large volumes of ICMP echo request packets to a victim system directly or through reflection networks.

a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack

A

d. ICMP Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS/DDoS Attack Techniques:

The attacker send a large number of SYN request to target server (victim) with fake source IP address.

SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH, SYN–SYN/ACH

a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack

A

b. SYN Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoS/DDoS Attack Techniques:

An attacker tries to crash, destabilize, or freeze the targeted system or service by sending malformed or oversized packets using a simple ping command.

a. Ping of Death Attack
b. SYN Flood Attack
c. UDP Flood Attack
d. ICMP Flood Attack

A

a. Ping of Death Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS/DDoS Attack Techniques:

  • Permanent DoS, refers to attacks that cause irreversible damage to system hardware.
  • This attack is carried out using a method know as “bricking a system”
A

Phlashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ________ is a huge nework of compromised systems and can be used by an attacker to launch denial-of-service attacks.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ are software applications that run automated tasks over the internet and perform simple repetitive tasks, such as web spidering and search engine indexing.

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS/DDoS Attack Tools:

_____ makes a DDoS to attack any IP address with a user selected port and a user selected protocol.

a. High Orbit Ion Cannon (HOIC)
b. Low Orbit Ion Cannon (LOIC)

A

a. High Orbit Ion Cannon (HOIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS/DDoS Attack Tools:

____ can be used on a target site to flood the server with TCP packets, UDP packets, or HTTP requests with the intention of disrupting the service of a particular host.

a. High Orbit Ion Cannon (HOIC)
b. Low Orbit Ion Cannon (LOIC)

A

b. Low Orbit Ion Cannon (LOIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly