Quiz Questions from Lessons Flashcards
Subnet Spoofing
Generate random addresses within
a given address space.
Random Spoofing
Generate 32-bit numbers and stamp
packets with them.
Fixed Spoofing
The spoofed address is the address
of the target.
Server Application DOS attack
The attack is targeted to a specific
application on a server
Network Access DOS attack
The attack is used to overload or
crash the communication mechanism of a
network.
Infrastructure DOS attack
The motivation of this attack is a
crucial service of a global internet
operation, for example core router
Random Scanning
Each compromised computer probes
random addresses
Permutation Scanning
All compromised computers share a
common pseudo-random permutation of the
IP address space.
Signpost Scanning
Uses the communication patterns of the
compromised computer to find new target.
Hitlist Scanning
A portion of a list of targets is supplied to
a compromised computer.
Which of these are reasons why the UDP-based NTP
protocol is particularly vulnerable to amplification attacks?
A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimate NTP severs.
The server must reject all TCP options because the server discards the SYN queue entry. T or F?
True
With regards to a UDP flood attack, which of the
following statements are true:
Attackers can spoof the IP address of their UDP packets
Firewalls cannot stop a flood because the firewall is
susceptible to flooding.
Client puzzles should be stateless
True
Puzzle complexity should increase as the strength of the
attack increases.
True
Which of the following are assumptions that can be
made about Traceback?
Attackers may work alone or in groups
Select all the statements that are true for edge
sampling:
Multiple attackers can be identified since edge identifies splits in reverse path
Requires space in the IP packet header
Self defense against reflector attacks should
incorporate:
Server redundancy - servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited
to reasonable thresholds.
Deep web
It is not indexed by standard search
engines
Dark web
Web content that exists on darknets
Surface web
Readily available to the public, and
searchable with standard search engines
Doorway pages
A webpage that lists many keywords, in
hopes of increasing search engine
ranking. Scripts on the page redirect to
the attackers page.
Crypters
A program that hides malicious code
from anti-virus software
Blackhat Search Engine Optimizer
It increases traffic to the attacker’s site
by manipulating search engines.