2-4 Flashcards

1
Q

a smurf atack is clever and simple. the hardest part of the attack is _________

A

getting the packets started on the netowork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

you can protect agains a smurf attack in 2 ways.

  1. configure your routers so the don’t forward any ______ .
  2. guard against __________.
A

direct broadcast messages // trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using _______ serves is critical . ______ servers can hide the internal IP addresses of your machine, wich will make it a lot less vulnerable to smurf attack

A

proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the simplest form of DOS attack, based on overloading the target system.

A

Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tcp packets are limited in size so ending a packet that is too large can sometimes _______

A

shut down a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ works to comprimise systems that cant deal with extremely large packet sizes

A

Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ flood attack occurs when an attacker sends ___ packet to random port on the victim system. when the system receives a _____ packet it determines if the app is waiting on the destination port. When there is no app waiting it generates a ICMP packet of destination unreachable. if enough ____ packets are delivered the system goes down

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ flood is another name for ping flood

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

if enough requests flood onto the network , the attacker can completely exhaust the address space allocated by the DHCP servers for an indefinate period of time. a tool called gobbler can prevent this. preventing incoming dhcp requests will prevent this

A

dhcp starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

sends a legitimate http post message . partof the post message is the content length( this indicates the size of the message to follow. the attacker then sends the actual message at an extremely slow rate. the server is then hung up waiting for the process to complete.

A

http post dos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an atack that is so sever that the victim either needs a os reinstall or new hardware.

A

pdos / permenent denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is a special dos attack. accomplished by getting a number of machines to attack a selected target. rather then getting the computers to attack the target, this method tricks the routers into attacking the target. many routers on the internet backbone communicate on port 179. this attack exploits that line of communication and gets routers to attack a target system.

A

distributed reflection denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

dos attacks are common because there are ______ available to execute these attacks

A

tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a well known online based tool to launch dos attacks

A

low orbit ion cannon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

more advanced then low orbit ion cannon, but simpler to run

A

high orbit ion cannon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly