Module 21 - Network Threats - Q&A Flashcards

1
Q
Which one of the following terms is used for impersonating a host or user?
A. Smurf attack
B. Man-in-the-middle
C. Session hijacking
D. Spoofing
A

D. A spoofing attack involves impersonating a user’s identity or the IP address, MAC address, or host name of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

All of the following are characteristics of a man-in-the-middle (MITM) attack, except:
A. Intercepting data
B. Altering and retransmitting data
C. Spoofing both sides of the communications session
D. Flooding the network with ICMP packets

A

D. Flooding the network with ICMP packets is not a typical characteristic of a MITM attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Intercepting a user’s credentials and retransmitting them in the hopes of authenticating as that user is known as a \_\_\_\_\_\_\_\_\_\_ attack.
A. session hijacking
B. replay
C. man-in-the-middle
D. spoofing
A

B. A replay attack involves intercepting a user’s credentials and retransmitting them in the hopes of authenticating as that user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following can be used to conduct a denial-of-service attack? (Choose all that apply.)
A. Specially crafted traffic
B. Malware
C. Large amounts of traffic
D. Man-in-the middle attacks
A

A, B, C. All of these can be used to conduct DoS attacks. A man-in-the-middle attack is not used to conduct a DoS attack; it is used to intercept and/ or modify data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You have received reports that a user’s host is very sluggish and unresponsive. After troubleshooting other items, you decide to use a sniffer to examine the network traffic coming into the host. You see that large amounts of ICMP traffic, in the form of ping replies, are being sent to the host. The host is having trouble processing all of this traffic, causing it to slow down. Which of the following is the most likely explanation for this?
A. Faulty network card
B. Man-in-the-middle attack
C. Smurf attack
D. SYN flood
A

C. A smurf attack would cause large amounts of ICMP traffic to be directed at a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
In a SYN flood attack, which of the following is a receiving host expecting back as a reply to complete the TCP three-way handshake?
A. Repeated SYN segments
B. A SYN/ ACK segment
C. A SYN segment
D. An ACK segment
A

D. A receiving host expects to receive an ACK segment as a reply to complete the TCP three-way handshake, but in a SYN flood, it receives continuous SYN segments instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following would be considered a distributed denial-of-service attack?
A. An attacker uses her own machine to attack another machine.
B. An attacker uses a network of 20 malware-infected hosts to attack a web server.
C. An attacker uses a SYN flood attack against a target’s external router.
D. An attacker uses a MITM attack against an unsuspecting rival hacker.

A

B. An attacker using a network of 20 malware-infected hosts to attack a web server qualifies as a distributed denial-of-service attack, since it involves using many hosts against the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following terms describes an infected host that joins a malicious network used to conduct a massive DDoS attack against another network?
A. Zombie
B. MITM
C. Drone
D. Trojan
A

A. A zombie is an infected host that joins a malicious network used to conduct a massive DDoS attack against another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following network attacks is used to further conduct a smurf attack on a victim host?
A. SYN flood
B. ARP poisoning
C. IP spoofing
D. MAC spoofing
A

C. IP spoofing is used to further conduct a smurf attack on a victim host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All of the following actions could be used to protect against ICMP-based attacks, except:
A. Denying ICMP inbound at a border security device
B. Allowing ICMP inbound through a host-based firewall
C. Configuring the host OS to disregard ICMP packets
D. Configuring all hosts to ignore broadcast ICMP Answers

A

B. Allowing ICMP inbound through a host-based firewall will not prevent an ICMP attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly