quiz Flashcards
Subnet Spoofing
Generate random addresses within a given address space
Random Spoofing
Generate 32-bit numbers and stamp packets with them
Fixed Spoofing
The spoofed address is the address of the target
Server Application DOS attack
The attack is targeted to a specific application on a server
Network Access DOS attack
The attack is used to overload or crash the communication mechanism of a network
Infrastructure DOS attack
The motivation of this attack is a crucial service of a global internet operation, for example core router
Random Scanning
Each compromised computer probes random addresses
Permutation Scanning
All compromised computers share a common pseudo-random permutation of the IP address space
Signpost Scanning
Uses the communication patterns of the compromised computer to find new target
Hitlist Scanning
A portion of a list of targets is supplied to a compromised computer
Which of these are the reasons why the UDP-based NTP protocol is particularly vulnerable to amplification attacks?
A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimateNTP servers
The server must reject all TCP options because the server discards the SYN queue entry. T or F?
True
With regards to a UDP flood attack, which of the following statements are true
Attackers can spoof the IP address of their UDP packets. Firewalls cannot stop a flood because the firewall is susceptible to flooding
Client puzzles should be stateless. T/F
True
Puzzle complexity should increase as the strength of the attack increases. TF
True
Which of the folloiwing are assumptions that can be made about Traceback?
Attackers may work alone or in groups
Select all the statements that are true for the edge sampling:
Multiple attackers can be identified since edge identifies splits in reverse path.
Requires space in IP packet header
Self defense against reflector attacks should incorporate:
Server redundancy- servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited to reasonable tresholds
Deep web
It is not indexed by standard search engines
Dark web
Web content that exists on darknets
Surface web
Readily available to the public, and searchable with standard search engines
Doorway pages
A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page.
Crypters
A program that hides malicious code from anti virus software
Blackhat search engine optimizer
It increases traffic to the attacker’s site by manipulating search engine