quiz Flashcards
Subnet Spoofing
Generate random addresses within a given address space
Random Spoofing
Generate 32-bit numbers and stamp packets with them
Fixed Spoofing
The spoofed address is the address of the target
Server Application DOS attack
The attack is targeted to a specific application on a server
Network Access DOS attack
The attack is used to overload or crash the communication mechanism of a network
Infrastructure DOS attack
The motivation of this attack is a crucial service of a global internet operation, for example core router
Random Scanning
Each compromised computer probes random addresses
Permutation Scanning
All compromised computers share a common pseudo-random permutation of the IP address space
Signpost Scanning
Uses the communication patterns of the compromised computer to find new target
Hitlist Scanning
A portion of a list of targets is supplied to a compromised computer
Which of these are the reasons why the UDP-based NTP protocol is particularly vulnerable to amplification attacks?
A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimateNTP servers
The server must reject all TCP options because the server discards the SYN queue entry. T or F?
True
With regards to a UDP flood attack, which of the following statements are true
Attackers can spoof the IP address of their UDP packets. Firewalls cannot stop a flood because the firewall is susceptible to flooding
Client puzzles should be stateless. T/F
True
Puzzle complexity should increase as the strength of the attack increases. TF
True
Which of the folloiwing are assumptions that can be made about Traceback?
Attackers may work alone or in groups
Select all the statements that are true for the edge sampling:
Multiple attackers can be identified since edge identifies splits in reverse path.
Requires space in IP packet header
Self defense against reflector attacks should incorporate:
Server redundancy- servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited to reasonable tresholds
Deep web
It is not indexed by standard search engines
Dark web
Web content that exists on darknets
Surface web
Readily available to the public, and searchable with standard search engines
Doorway pages
A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page.
Crypters
A program that hides malicious code from anti virus software
Blackhat search engine optimizer
It increases traffic to the attacker’s site by manipulating search engine
Trojan download manager
Software that allows an attacker to update or install malware on a victim’s computer
What are the two defining characteristics of the internet spam?
Inappropriate or irrelevant
Large number of recipients
Name the top three countries where spam directed visitors added items to their shopping cart
US
Canada
Philippines
Which events should trigger a penetration test
Apps are addred or modified
End user policies are changed
Security patches are installed
Infrastructure is added or modified
List the steps attackers use to access RSA adobe flash software
Identify employees are vulneralbe
Craft an email subject line that entices an employee to open it
Hide an executable file in the email that will install onto the victim’s computer when email is opened
Flash or CD autoplay attack
A flash is created that has a program that creates a connection to the exploit server
Reverse shell applet attack
A signed JAVA applet is sent to the user, if they accept it, a shell is sent back to the exploit server
Click logger attack
Used to determine which users click on links in emails
Download connection attack
An email contains an attachment, when the attackment is downloaded an connection is made to the exploit server
ON the pie chart, what are the top 3 industries that were targets in 2016?
Defense contractor
restaurant
software
Tier one
A network can reach every other network through peering
Tier 2
A network that peers some of its network access and purchases some of it
Tier 3
A netowkr that purchases all transit from other networks
ip PROVIDES ONLY BEST EFFORT DELIVERY, ITS NOT GUARANTEED
True