click below
click below
Normal Size Small Size show me how
ITN 266 CHAP 4
| Question | Answer |
|---|---|
| Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her IP address. | True |
| ________ are an additional layer of compromised hosts that are used to manage large groups of bots. | Handlers |
| Once established, botnets can be leased to other criminals for DoS attacks. | True |
| Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs. | wireless, wired |
| The authenticator is the ________. | workgroup switch |
| In a reflected DoS attack, attackers send spoofed requests to legitimate servers. The servers then send all responses to the victim. | True |
| ARP is used to resolve 32-bit IP addresses into 48-bit local MAC addresses. | True |
| A ________ attack is when a victim is flooded with ICMP packets that appear to be normal supervisory traffic. | Ping flood |
| An indirect attack occurs when an attacker tries to flood a victim with a stream of packets directly from the attacker's computer. | False |
| Rerouting traffic using ARP poisoning is an attack on ________ of a network. | Both functionality and confidentiality |
| ________ is one method of thwarting DoS attacks by dropping all IP packets from an attacker. | Black holing |
| ________ is the process of obscuring an attackers source IP address. | Spoofing |
| ICMP can be best described as the second part of a three-way TCP handshake sent in response to a SYN. | False |
| In a MITM attack, access to the local network is not required in order to work. | False |
| In a P2P attack, there is a change in the overall volume of traffic but the traffic pattern is the same. | False |
| The main access threat to 802.11 wireless LANs is an attacker plugging into a wall jack. | False |
| ________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication. | Rate limiting |
| ________ is called Port-Based Access Control. | 802.1X |
| A ________ attack is when a webserver is flooded with application layer web requests. | HTTP flood |
| In normal ARP traffic, every host can make ARP requests. | True |