Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
половина база.docx
Скачиваний:
5
Добавлен:
01.05.2025
Размер:
40.17 Кб
Скачать

82. One of the most famous documented dDoS attacks Back. How does the Back work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

84. One of the most famous documented dDoS attacks Land. How does the Land work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?

A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash

B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.

C. The attacker sends the victim a malformed GET request, which can crash the Web server.

D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.

E. The victim's mail queue is flooded by an abundance of messages, causing system failure.

86. Using Magic Square cipher encrypt the message “MAJOR” with the given key 3 and generated magic square .<br/> .M..RJA.O