1. You configure a computer to act as a zombie set in order to attack a web server on a specific date. What would this contaminated computer be part of?
A) The computer is part of a DDoS attack B) The computer is part of a TCP/IP hijacking C) The computer is part of a spoofing attack D) The computer is part of a man-in-the-middle attack
2. A DoS attack that sends a flood of synchronization (SYN) requests and never sends the final acknowledgement (ACK) is typically known as which of the following?
A) Smurf B) Ping Flood C) Fraggle D) SYN flood
3. Which of the following can be termed as the Denial of Service Attack? Choose the best answer.
A) A computer on your network has crashed B) Your router is unable to find a destination outside of your network C) Your Web server has gone into a loop trying to service a client request D) You keyboard is no longer responding
4. In an IP (Internet Protocol) spoofing attack, what field of an IP (Internet Protocol) packet does the attacker manipulate?
A) The version field B) The source address field C) The source port field D) The destination address field
5. Which of these options contains the three basic target categories for a DoS or a DDoS?
A) Resources, printers and storage devices B) Networks, systems and applications C) Systems, memory, network access card D) Network access card, applications, peripheral devices
Leave a comment