course hero 8. at what point is the victim machine considered to be compromised?

by Ezequiel Bergnaum 7 min read

When multiple computers are synchronized to knock a victim offline?

When multiple computers are synchronized in an attempt to knock a victim offline or make services unavailable, it is called a: Distributed denial of service attack Man in the middle attack Email spoofing Denial of Internet attack Distributed denial of service attack Which of the following is commonly used in DDoS attacks?

Which IDS is efficient at identifying previously observed attacks?

A signature based IDS is efficient at identifying previously observed and documented attacks. True False True What does a virtual private network do? Scans the interior of a network looking for signs that the network is under attack Keeps unwanted traffic from the Internet isolated from the inside network

What are administrators concerned about when a virus infects a system?

b. Administrators are concerned that a system infected with a virus may attempt to connect back to the virus' author and upload stolen information. c. Few corporations filter traffic going out to the Internet. d. Corporations are concerned that employees may be buying and selling information to competitors or other organizations.

How can a victim exploit the syn protocol?

By flooding the victim with SYN requests from different machines, thereby requiring the victim's machine to send back TCP replies to every requester Incorrect b. Taking up bandwidth on the victim's end by exploiting the SYN bit in TCP packets

What happens if the sender and receiver are able to communicate with each other independently of the attacker?

If the sender and receiver are able to communicate with each other independently of the attacker then the attack may fail. Eavesdropping attack. Every router between a source and destination is in a position to eavesdrop. Eavesdropping leads to many security concerns.

What is DNS attack?

An attack in which a user winds up at a different website other than the one they intended to visit. An attack in which the DNS file on a local system is altered without the user's knowledge. An attack in which the DNS records currently cached by one server are altered to contain false information. None of the above.

Why are botnets important?

b. Botnets are important in perpetrating a DDoS attack due to the greater chance of success, which can lead to a larger sum of money extorted.

Is WPA2 a strong key?

WPA2 is considered very secure and virtually unbreakable if a strong key is set up. Wireless Networks. The most significant difference when considering security between wired and wireless networks, is the physical medium used to transmit the data. (1) Wired networks use some type of metal or fiber-optic wire.

image