Denial of Service Attacks Flashcards

1
Q

A ____________ attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.

A

Denial-Of-serive (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three resources that can be targeted during a DoS?

A

Network Bandwidth
System resources
Application resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ _______ relates to the capacity of the network links connecting a server to the wider Internet (ISP).

A

Network Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A form of system resource attack that uses packets whose structure triggers a bug in the system’s network handling software, causing it to crash.

A

Poison packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A common characteristic of packets used in many types of DoS attacks is the use of forged source addresses.

A

Source address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ability of a network server to respond to TCP connection request by overflowing the tables used to manage such connections.

A

SYN spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ attacks take a variety of forms, based on which network protocol is being used to implant the attack. In all cases the intent is generally to overload the network capacity on some link to a server.

A

Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between SYN flooding attack and SYN spoofing attack.

A

In SYN flooding it is the total volume of packets that is the aim of the attack rather than the system code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three indirect attack types that utilize multiple systems?

A

Distributed denial-of-service
Reflector attacks
Amplifier attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An _____ ______ refers to an attack that bombards Web servers with HTTP requests.

A

HTTP flood

Typically a DDos attack, with HTTP requests coming form many different bots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ exploits the common server technique of using multiple threads to support multiple requests to the same server applications

A

Slowloris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. When the intermediary responds, the response is sent to the target. Effectively this reflects the attack off the intermediary.

A

Reflection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ _______ are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

A

Amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four lines of defense against DDoS attacks?

A

Attack prevention and preemption (before the attack)
Attack detection and filtering (during the attack)
Attack source traceback and identification (during and after the attack)
Attack reaction (after the attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These mechanisms enable the victim to endure attack attempts without denying service to legitimate clients. Techniques include enforcing policies for resource consumption and providing backup resources available on demand. In addition, prevention mechanisms modify systems and protocols on the internet to reduce the possibility of DDoS attacks.

A

Attack prevention and preemption (before the attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These mechanisms attempt to detect the attack as it begins and respond immediately. This minimizes the impact of the attack on the target. Detection involves looking for suspicious patterns of behavior. Response involves filtering out packets likely to be part of the attack.

A

Attack detection and filtering (during the attack)

17
Q

This is an attempt to identify the source of the attack as a first step in preventing future attacks. However, this method typically does not yield results fast enough, if at all, to mitigate an ongoing attack.

A

Attack source traceback and identification (during and after the attack)

18
Q

This is an attempt to eliminate or curtails the effects of an attack.

A

Attack reaction (after the attack)

19
Q

Relates to the capacity of the network links connecting a server to the internet

A

Network Bandwidth

20
Q

Aims to overload or crash the network handling software

A

System Resources

21
Q

Typically involves a number of valid requests, each of which consumes significant resources, thus limiting the ability of the server to respond to requests from other users.

A

Application resources

22
Q

Flooding ping command

Aim of this attack is to overwhelm the capacity of the network connection to the target organization.

A

Classic DoS Attacks

23
Q

Attacks the ability of a server to respond to future connection requests by overflowing the tables used to manage them.

A

SYN Spoofing

24
Q

What does ICMP stand for?

A

Internet Control Message Protocol

25
Q

Ping flood using _____ echo request packets. Traditionally network administrators allow such packets into their networks because ping is a useful network diagnostic

A

ICMP flood

26
Q

What are three different flooding attacks

A

ICMP flood
UDP flood
TCP SYN flood

27
Q

Uses _____ packets directed to some port number on the target system

A

UDP flood

28
Q

Sends _____ packets to the target system. Total volume of packets is the aim of the attack rather than the system code.

A

TCP SYN flood

29
Q

What does SIP stand for?

A

Session Initiation Protocol

30
Q

Attack that bombards Web servers with HTTP requests. Consumes considerable resources.

A

HTTP flood

31
Q

Use packets directed at a legitimate DNS server as the intermediary system. Attacker creates a series of DNS requests containing the spoofed source address of the target system. Exploit DNS behavior to convert a small request to a much larger response.

A

DNS Amplification Attacks