Module 3-03 Challenge Flashcards
What do network-level Denial of Service (DoS) attacks target?
- Commonly used software applications
- The personal information of employees
- All hardware within an organization
- Network bandwidth
Network bandwidth
Which of the following statements accurately describe Denial of Service (DoS) and Distributed
Denial of Service (DDoS) attacks? Select all that apply.
- A DoS attack may involve flooding a network with traffic.
- A DDoS attack is intended to overwhelm the target server.
- A DoS attack may use multiple servers in different locations to flood the target network with unwanted traffic.
- In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
- In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
- A DoS attack targets a network or server.
- A DoS attack involves multiple hosts carrying out the attack.
- A DoS attack may involve flooding a network with traffic.
- A DDoS attack is intended to overwhelm the target server.
- In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
- A DoS attack targets a network or server.
A security team investigates a server that has been overwhelmed with SYN packets. What does this scenario describe?
- ICMP flood attack
- On-path attack
- SYN flood attack
- Ping of Death
SYN flood attack
The DoS attack _____ occurs when an attacker repeatedly sends ICMP packets to a network server.
- on-path
- ICMP flood
- smurf
- SYN flood
ICMP flood
Which of the following statements correctly describe passive and active packet sniffing? Select all that apply.
- Active packet sniffing involves data packets being manipulated in transit.
- Using a VPN to encrypt data offers a business protection from packet sniffing.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
- The purpose of active packet sniffing is to read data packets while in transit.
- A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
- Active packet sniffing may enable attackers to redirect the packets to unintended ports.
- Passive packet sniffing enables attackers to change the information a packet contains.
- Active packet sniffing involves data packets being manipulated in transit.
- Using a VPN to encrypt data offers a business protection from packet sniffing.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
- A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
- Active packet sniffing may enable attackers to redirect the packets to unintended ports.
As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?
- Packet sniffing
- SYN flooding
- IP spoofing
- Ping of death
IP spoofing
To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.
- demilitarized zone
- VPN
- firewall
- HTTPS domain address
firewall
Which attack is a combination of a DDoS and an IP spoofing attack, during which the malicious actor overwhelms a target computer?
- Replay attack
- Ping of Death
- On-path attack
- Smurf attack
Smurf attack
In which attack do malicious actors impersonate a web browser or web server by placing themselves between the two devices, then sniffing the packet information to discover their IP and MAC addresses?
- Packet flooding attack
- On-path attack
- Smurf attack
- Malware attack
On-path attack
The _____ network attack occurs when an attacker delays a data packet after intercepting it in transit.
- on-path
- SYN flood
- smurf
- replay
replay
What happens during a Denial of Service (DoS) attack?
- The network is infected with malware.
- The data packets containing valuable information are stolen as they travel across the network.
- The target crashes and normal business operations cannot continue.
- The attacker successfully impersonates an authorized user and gains access to the network.
The target crashes and normal business operations cannot continue.
The DoS attack _____ occurs when a malicious actor sends an oversized ICMP packet to a server.
- smurf
- SYN flood
- Ping of Death
- on-path
Ping of Death
Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
- The purpose of active packet sniffing is to read data packets while in transit.
- Active packet sniffing involves data packets being manipulated in transit.
- Using a VPN to encrypt data offers a business protection from packet sniffing.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
- Active packet sniffing involves data packets being manipulated in transit.
- Using a VPN to encrypt data offers a business protection from packet sniffing.
As a security professional, you take steps to stop an attacker from changing the source IP of a data packet in order to impersonate your authorized system. What type of network attack are you working to prevent?
- Active packet sniffing
- Ping of Death
- Passive packet sniffing
- IP spoofing
IP spoofing
What is the main objective of a Denial of Service (DoS) attack?
- Disrupt normal business operations
- Simulate a TCP connection and flood a server with SYN packets
- Repeatedly send ICMP packets to a network server
- Send oversized ICMP packets
Disrupt normal business operations
The maximum size of a correctly formatted IPv4 ICMP packet is _____, as opposed to the oversized packet that is sent during a Ping of Death attack.
- 64KB
- 32KB
- 15Gb
- 64TB
64KB
Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
- A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
- Active packet sniffing may enable attackers to redirect the packets to unintended ports.
- Passive packet sniffing enables attackers to change the information a packet contains.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
- A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
- Active packet sniffing may enable attackers to redirect the packets to unintended ports.
- Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
As a security professional, you implement safeguards against attackers changing the source IP of a data packet in order to communicate over your company’s network. What type of network attack are you trying to avoid?
- IP spoofing
- Active packet sniffing
- Ping of Death
- Passive packet sniffing
IP spoofing
What are some common IP spoofing attacks? Select all that apply.
- on-path attacks
- replay attacks
- smurf attacks
- KRACK attacks
- on-path attacks
- replay attacks
- smurf attacks
Which combination of DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?
- Smurf attack
- Replay attack
- On-path attack
- Ping of Death
Smurf attack