Quiz Questions from Lessons Flashcards
Subnet Spoofing
Generate random addresses within
a given address space.
Random Spoofing
Generate 32-bit numbers and stamp
packets with them.
Fixed Spoofing
The spoofed address is the address
of the target.
Server Application DOS attack
The attack is targeted to a specific
application on a server
Network Access DOS attack
The attack is used to overload or
crash the communication mechanism of a
network.
Infrastructure DOS attack
The motivation of this attack is a
crucial service of a global internet
operation, for example core router
Random Scanning
Each compromised computer probes
random addresses
Permutation Scanning
All compromised computers share a
common pseudo-random permutation of the
IP address space.
Signpost Scanning
Uses the communication patterns of the
compromised computer to find new target.
Hitlist Scanning
A portion of a list of targets is supplied to
a compromised computer.
Which of these are reasons why the UDP-based NTP
protocol is particularly vulnerable to amplification attacks?
A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimate NTP severs.
The server must reject all TCP options because the server discards the SYN queue entry. T or F?
True
With regards to a UDP flood attack, which of the
following statements are true:
Attackers can spoof the IP address of their UDP packets
Firewalls cannot stop a flood because the firewall is
susceptible to flooding.
Client puzzles should be stateless
True
Puzzle complexity should increase as the strength of the
attack increases.
True
Which of the following are assumptions that can be
made about Traceback?
Attackers may work alone or in groups
Select all the statements that are true for edge
sampling:
Multiple attackers can be identified since edge identifies splits in reverse path
Requires space in the IP packet header
Self defense against reflector attacks should
incorporate:
Server redundancy - servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited
to reasonable thresholds.
Deep web
It is not indexed by standard search
engines
Dark web
Web content that exists on darknets
Surface web
Readily available to the public, and
searchable with standard search engines
Doorway pages
A webpage that lists many keywords, in
hopes of increasing search engine
ranking. Scripts on the page redirect to
the attackers page.
Crypters
A program that hides malicious code
from anti-virus software
Blackhat Search Engine Optimizer
It increases traffic to the attacker’s site
by manipulating search engines.
Trojan Download Manager
Software that allows an attacker to
update or install malware on a victim’s
computer.
What are the two defining characteristics of internet spam?
Inappropriate or irrelevant
Large number of recipients
Name the top three countries where spam directed visitors
added items to their shopping cart:
United States
Canada
Philippines
Which events should trigger a penetration test?
Applications are added or modified
End user policies are changed
Security patches are installed
Infrastructure is added or modified
List the steps attackers used to access RSA’s Adobe Flash software:
Identify employees that are vulnerable Craft an email subject line that entices an employee to open it Hide an executable file in the email that will install onto the victim's computer when the email is opened
Flash or CD Autoplay Attack
A flash is created that has a program that
creates a connection to the exploit server
Reverse Shell Applet Attack
A signed Java applet is sent to the user, if they
accept it, a shell is sent back to the exploit
server.
Click Logger Attack
Used to determine which users click on links in
emails
Download Connection Attack
An email contains an attachment. When the
attachment is downloaded an connection is made
to the exploit server.
On this pie chart, what are the top three industries that were targets
of cyber attacks in 2016?
Defense contractor
Restaurant
Software
Tier One
A network can reach every other network
through peering.
Tier Two
A network that peers some of its network
access and purchases some of it.
Tier Three
A network that purchases all transit from
other networks
IP provides only best effort delivery, it is not
guaranteed.
True
Due the connectionless nature of IP, data
corruption, packet loss, duplication, and
out-of-order delivery can occur.
True
Network layer controls can protect the data within the
packets as well as the IP information for each packet.
True
IP information cannot be protected by transport layer controls.
True
Address Resolution Protocol (ARP)
protocol designed to map IP network
addresses to the hardware addresses
used by a data link protocol
Open Shortest Path First (OSPF)
protocol uses a link state routing
algorithm and falls into the group of
interior routing protocols
Border Gateway Protocol (BGP)
protocol designed to exchange routing and reachability information among autonomous systems (AS)
Denial of Service
Create a false route or kill a legitimate one.
Sniffing
The attacker must control a device along
the victim’s communication path.
Routing to Endpoints in Malicious
Networks
The first step is to hijack traffic from a
legitimate host