Module 3-03 Challenge Flashcards

1
Q

What do network-level Denial of Service (DoS) attacks target?

  • Commonly used software applications
  • The personal information of employees
  • All hardware within an organization
  • Network bandwidth
A

Network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements accurately describe Denial of Service (DoS) and Distributed
Denial of Service (DDoS) attacks? Select all that apply.

  • A DoS attack may involve flooding a network with traffic.
  • A DDoS attack is intended to overwhelm the target server.
  • A DoS attack may use multiple servers in different locations to flood the target network with unwanted traffic.
  • In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
  • In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
  • A DoS attack targets a network or server.
  • A DoS attack involves multiple hosts carrying out the attack.
A
  • A DoS attack may involve flooding a network with traffic.
  • A DDoS attack is intended to overwhelm the target server.
  • In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
  • A DoS attack targets a network or server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security team investigates a server that has been overwhelmed with SYN packets. What does this scenario describe?

  • ICMP flood attack
  • On-path attack
  • SYN flood attack
  • Ping of Death
A

SYN flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The DoS attack _____ occurs when an attacker repeatedly sends ICMP packets to a network server.

  • on-path
  • ICMP flood
  • smurf
  • SYN flood
A

ICMP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements correctly describe passive and active packet sniffing? Select all that apply.

  • Active packet sniffing involves data packets being manipulated in transit.
  • Using a VPN to encrypt data offers a business protection from packet sniffing.
  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
  • The purpose of active packet sniffing is to read data packets while in transit.
  • A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
  • Passive packet sniffing enables attackers to change the information a packet contains.
A
  • Active packet sniffing involves data packets being manipulated in transit.
  • Using a VPN to encrypt data offers a business protection from packet sniffing.
  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
  • A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?

  • Packet sniffing
  • SYN flooding
  • IP spoofing
  • Ping of death
A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.

  • demilitarized zone
  • VPN
  • firewall
  • HTTPS domain address
A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which attack is a combination of a DDoS and an IP spoofing attack, during which the malicious actor overwhelms a target computer?

  • Replay attack
  • Ping of Death
  • On-path attack
  • Smurf attack
A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In which attack do malicious actors impersonate a web browser or web server by placing themselves between the two devices, then sniffing the packet information to discover their IP and MAC addresses?

  • Packet flooding attack
  • On-path attack
  • Smurf attack
  • Malware attack
A

On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _____ network attack occurs when an attacker delays a data packet after intercepting it in transit.

  • on-path
  • SYN flood
  • smurf
  • replay
A

replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens during a Denial of Service (DoS) attack?

  • The network is infected with malware.
  • The data packets containing valuable information are stolen as they travel across the network.
  • The target crashes and normal business operations cannot continue.
  • The attacker successfully impersonates an authorized user and gains access to the network.
A

The target crashes and normal business operations cannot continue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The DoS attack _____ occurs when a malicious actor sends an oversized ICMP packet to a server.

  • smurf
  • SYN flood
  • Ping of Death
  • on-path
A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements correctly describe passive and active packet sniffing? Select three answers.

  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
  • The purpose of active packet sniffing is to read data packets while in transit.
  • Active packet sniffing involves data packets being manipulated in transit.
  • Using a VPN to encrypt data offers a business protection from packet sniffing.
A
  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
  • Active packet sniffing involves data packets being manipulated in transit.
  • Using a VPN to encrypt data offers a business protection from packet sniffing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As a security professional, you take steps to stop an attacker from changing the source IP of a data packet in order to impersonate your authorized system. What type of network attack are you working to prevent?

  • Active packet sniffing
  • Ping of Death
  • Passive packet sniffing
  • IP spoofing
A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main objective of a Denial of Service (DoS) attack?

  • Disrupt normal business operations
  • Simulate a TCP connection and flood a server with SYN packets
  • Repeatedly send ICMP packets to a network server
  • Send oversized ICMP packets
A

Disrupt normal business operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The maximum size of a correctly formatted IPv4 ICMP packet is _____, as opposed to the oversized packet that is sent during a Ping of Death attack.

  • 64KB
  • 32KB
  • 15Gb
  • 64TB
16
Q

Which of the following statements correctly describe passive and active packet sniffing? Select three answers.

  • A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
  • Passive packet sniffing enables attackers to change the information a packet contains.
  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
A
  • A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
  • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
17
Q

As a security professional, you implement safeguards against attackers changing the source IP of a data packet in order to communicate over your company’s network. What type of network attack are you trying to avoid?

  • IP spoofing
  • Active packet sniffing
  • Ping of Death
  • Passive packet sniffing
A

IP spoofing

18
Q

What are some common IP spoofing attacks? Select all that apply.

  • on-path attacks
  • replay attacks
  • smurf attacks
  • KRACK attacks
A
  • on-path attacks
  • replay attacks
  • smurf attacks
19
Q

Which combination of DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?

  • Smurf attack
  • Replay attack
  • On-path attack
  • Ping of Death
A

Smurf attack