2-1 Flashcards

1
Q

any attack that aims to deprive legitimate users of the use of the target system

A

dos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

many experts feel the __________ is so common because its attacks are fairly easy to execute

A

dos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the underlying concept behind any DOS attack is that __________

A

every system has limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typing /h or ping /? will show you all the options for the

A

ping command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

anytime you you change the configuraton file you must stop the apache server and _______

A

restart it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

apache program will allow you to turn a node into a

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one way to verify that the designated computer is running as a server is to open your browser and type the target machines __________

A

ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ping option ___ will determine how long I’m milliseconds a ping utility will wait for response from its target. enter ___ and the compute will not wait at all

A

-w // -0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the ___ option instructs the ping utility to keep sending packets until told to stop. adding the _____ will alow you to change the size of the packet you send

A

-t // -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

flood the target machine with so many requests that it can no longer respond

A

dos attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

getting various means, possibly through the use of a virus to flood a target machine with ping messages

A

ping flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a dos attack launched from several different machines is called a ______. its now the most common form of Dos

A

DdoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 reasons why DDOS is becoming more popular

A

overloading a system is easier with multiple machines

it allows the attacker to launch the attack from someone elses machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

session established packets include a ____ field that id’s the sequence in the message exchange

A

syn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in a ________ an attacker sends a number of connection requests very quickly and then fails to respond to the reply that is sent back by the server.

A

syn flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

each connection request sets asside resources to handle the ___________ to establish the connection

A

handshake