When multiple computers are synchronized in an attempt to knock a victim offline or make services unavailable, it is called a: Distributed denial of service attack Man in the middle attack Email spoofing Denial of Internet attack Distributed denial of service attack Which of the following is commonly used in DDoS attacks?
A signature based IDS is efficient at identifying previously observed and documented attacks. True False True What does a virtual private network do? Scans the interior of a network looking for signs that the network is under attack Keeps unwanted traffic from the Internet isolated from the inside network
b. Administrators are concerned that a system infected with a virus may attempt to connect back to the virus' author and upload stolen information. c. Few corporations filter traffic going out to the Internet. d. Corporations are concerned that employees may be buying and selling information to competitors or other organizations.
By flooding the victim with SYN requests from different machines, thereby requiring the victim's machine to send back TCP replies to every requester Incorrect b. Taking up bandwidth on the victim's end by exploiting the SYN bit in TCP packets
If the sender and receiver are able to communicate with each other independently of the attacker then the attack may fail. Eavesdropping attack. Every router between a source and destination is in a position to eavesdrop. Eavesdropping leads to many security concerns.
An attack in which a user winds up at a different website other than the one they intended to visit. An attack in which the DNS file on a local system is altered without the user's knowledge. An attack in which the DNS records currently cached by one server are altered to contain false information. None of the above.
b. Botnets are important in perpetrating a DDoS attack due to the greater chance of success, which can lead to a larger sum of money extorted.
WPA2 is considered very secure and virtually unbreakable if a strong key is set up. Wireless Networks. The most significant difference when considering security between wired and wireless networks, is the physical medium used to transmit the data. (1) Wired networks use some type of metal or fiber-optic wire.