module 6 Flashcards

(12 cards)

1
Q

Learning Objectives:

Understand DoS attacks and their mechanisms

Discuss flooding and reflection attacks

Describe distributed denial of service attacks (DDoS)

Understand DDoS attack architecture

Explain amplification attacks

Understand HTTP-based attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Contents Covered:

DoS Attacks

Common DoS Attacks

Flooding and Reflection Attacks

DDoS Attacks and Architecture

Amplification Attacks

HTTP Attacks

Famous DDoS Attacks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: A Denial of Service (DoS) attack aims to gain unauthorized access to sensitive data.

A

Answer: False. A DoS attack aims to disrupt the availability of services, not to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiple Choice: Which of the following best describes a flooding attack?

A. Sending malformed packets to confuse the application

B. Overwhelming a target system with a high volume of traffic

C. Intercepting data in transit

D. Disguising malicious traffic as legitimate

A

Answer: B. Overwhelming a target system with a high volume of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Multiple Choice: Which of the following is a characteristic of a DDoS (Distributed Denial of Service) attack?

A. It is conducted from a single source

B. It always involves ransomware

C. It uses multiple compromised systems to target a victim

D. It requires physical access to the server

A

Answer: C. It uses multiple compromised systems to target a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short Answer: What is the difference between a reflection attack and a flooding attack in the context of DoS?

A

Answer: A flooding attack sends a massive volume of traffic directly to the target, while a reflection attack sends requests to third-party servers with the target’s IP as the return address, causing the servers to flood the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Short Answer: Why are DDoS attacks harder to mitigate than traditional DoS attacks?

A

Answer: DDoS attacks originate from multiple sources, making it difficult to block malicious traffic without affecting legitimate users and requiring more complex mitigation strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Amplification attacks rely on requesting small amounts of data and receiving large responses that are redirected to the victim.

A

Answer: True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multiple Choice: In an amplification attack, which type of service is commonly exploited?

A. SMTP

B. FTP

C. DNS

D. HTTPS

A

Answer: C. DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Short Answer: Explain how HTTP-based DDoS attacks differ from volumetric DDoS attacks.

A

Answer: HTTP-based DDoS attacks target the application layer (Layer 7), exploiting resource-intensive operations, while volumetric attacks flood the network or transport layer with large volumes of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multiple Choice: Which of the following best describes a botnet in the context of DDoS attacks?

A. A network of secure web servers

B. A set of tools used for web development

C. A group of compromised devices controlled by an attacker

D. An antivirus system

A

Answer: C. A group of compromised devices controlled by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Essay-Like Prompt: Discuss the architecture of a DDoS attack and the role of botnets. How do amplification and HTTP-based attacks exploit system vulnerabilities differently?

A

Answer: DDoS attacks use a distributed network of compromised systems (botnets) to flood a target with traffic. The architecture involves command-and-control servers managing these bots. Amplification attacks exploit vulnerable services (like DNS) by sending small queries that generate large responses aimed at the victim. HTTP-based attacks target application resources by sending seemingly legitimate requests, overwhelming web servers. While amplification focuses on bandwidth exhaustion, HTTP-based attacks deplete computational resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly