2-3 Flashcards

1
Q

the popularity for the syn flood attack is because any machine connected to the __________is vulnerable to the attack

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

defense using ________ seeks to avoid syn floods by changing the was the server allocates memory for any given connection request

A

Micro blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

instead of allocating a complete connection object the server is altered so that it only allocates a _____ record as small as __________

A

micro // 16 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a common method of defending against DOS attacks is for the firewall or IDS to detect excessive traffic and _________

A

restrict bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

defending using syn cookies. using this method the system does not automatically create a buffer space in the memory for the handshake. a syn cookie that is generated as a hash is sent with IP address, port number and other ifo for the server to verify, this was the system does not fully _______ resources to the handshake.

A

allocate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

syn cookie is fairly intensive so admins expecting __________ should consider something else

A

heavy traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the syn cookie defense method is an example of the trade off between __________

A

performance and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

looks at all the packets from a given source

A

stateful packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the server sends the wrong SNYACK back to the client. the client should then generate a RST ( reset ) packet telling the sever that something is wrong. because the RST message is sent the server now know the traffic is legit.

A

defending with rst cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 disadvantages to RST cookies defense

A

firewalls might block traffic // older windows machines commmunicate from behind a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this defense method involves altering the TCP stack of the server so that it will take less time to timeout when the syn connection is left incomplete. this will only make executing a syn flood against a target more difficult. this method is often quite complicated to implement on some OS’s.

A

defending with stack tweaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

for the best defense against a DOS attack is a combination fo syn cookies and rst cookies because they __________

A

cover each other’s weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the smurf attack is named after the

A

first application first used to execute the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICMP packet is sent out to the broadcast address of a network, but its return has been altered to match one of the computers on the net, most likely a key server. all computers on the net will then responds by pinging the target computer. because the address the packets are sent to is a broadcast address , the address responds by echoing the packet out of all hosts n the network who then send it to a spoofed source address.

A

smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly