Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
pl (1).docx
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
2.83 Mб
Скачать

147. One of the most famous documented dDoS attack is the sshProcessTable. How does the sshProcessTablework?

Выберите один ответ.

This attack exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.

Attacker creates a packet that contains more than 65,536 bytes. This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.

This attack makes hundreds of connections to the victim with the Secure Shell (SSH) Protocol without completing the login process.

The victim's mail queue is flooded by an abundance of messages, causing system failure.

The attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.

148. Which of the following are weaknesses of Stateful Packet Inspection Firewall?(Choose 2 answers)

Выберите по крайней мере один ответ:

By having the ability to "remember" the status of a connection, this method of packet screening is better equipped to guard against attacks than standard packet filtering.

Rules and filters in this packet screening method can become complex, hard to manage, prone to error and difficult to test.

Like packet filtering, stateful packet inspection does not break the client/server model and therefore allows a direct connection to be made between the two endpoints

Stateful packet inspection compares the packets against the rules or filters and then checks the dynamic state table to verify that the packets are part of a valid, established connection.

The packets are compared to pre-configured rules or filters and allow or deny decisions are made based on the results of the comparison.

149. One of the most famous documented dDoS attack is the Mailbomb. How does the Mailbomb work?

Выберите один ответ.

In a Mailbomb attack, attacker creates a packet that contains more than 65,536 bytes .This packet can cause different kinds of damage to the machine that receives it, such as crashing and rebooting.

In a Mailbomb attack, attacker exploits the feature of some network services to generate a new process each time a new TCP/IP connection is set up.

In a Mailbomb attack, the victim is flooded with Internet Control Message Protocol (ICMP) "echo-reply" packets.

In a Mailbomb attack, the attacker sends an abundance of TCP SYN packets to the victim, obliging it both to open a lot of TCP connections and to respond to them.

In a Mailbomb attack, the victim's mail queue is flooded by an abundance of messages, causing system failure.

150. A function that maps a variable-length data block or message into a fixed-length value called a hash code. The function is designed in such a way that, when protected, it provides an authenticator to the data or message. Also referred to as a message digest.

Выберите один ответ.

Honeypot

Hash Function

Feistel Cipher

Kerberos

Intrusion detection system

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]