CMIT 321 Week 4 Quiz
points
This can be used to identify DoS Attacks:
SHA-1
Cusum
MD5
SHA-256
Question 0/5
2 points
Which of the following are password cracking techniques? (choose all
that apply)
Dictionary Attacks
Guessing
Brute Force Attacks
Hybrid Attack
Question 0/5
3 points
Which of the following are true when referring to the term
phlashing? (choose all that apply)
A type of permanent Denial of Service
Something that can cause a device to render hardware inoperable
Can be known as bricking
An email attack in which the user is enticed to click on links
,Question 0/5
4 points
BlackShades Net can best be described as a:
DDoS Tool
Bot
Wrapper
RAT
Question 0/5
5 points
It was publicized that BlackShades Net was used as an attack tool
against:
Sony Pictures
Target
RSA
Syrian Political Activists
Question 0/5
6 points
During this type of an attack, the attacker takes over a DNS server
and changes the DNS settings so that all the requests coming to the
target web server are directed to the attacker’s own malicious
servers.
Session Hijacking
Denial of DNS (DoD)
Web Server Hijacking
, DNS Hijacking
Question 0/5
7 points
What three things happen when a distributed reflective denial of
service attack (DRDoS) is used?
Traffic will be directed to secondary victims
The source Address will be spoofed
Traffic will be directed to intermediate hosts
Traffic to the secondary hosts will originate from the intermediate hosts
Question 0/5
8 points
Which of following items does a DNS Amplification Attack take
advantage of?
DNS Recursive Method
DNS Reverse Lookup
Host file
DNS zone transfer
Question 0/5
9 points
What does Permutation Scanning utilize to find new machines?
Looking for new vulnerable machines on the local subnet
Using a pseudorandom permutation list
Using information from infected machines
, Collecting a list of possibly vulnerable machines
Question 0/5
10 points
To crash a webserver, what should an attacker target? (Select all that
apply)
Database space
Server Memory
CPU
Network Bandwidth
Question 0/5
11 points
Which DOS tool(s) work(s) from a mobile platform? (check all that
apply)
LOIC
AnDOSid
HULK
DOSSIM
Question 0/5
12 points
Egress filtering includes which of the following (choose all that apply):
Scanning packet headers of IP packets leaving the network
Not allowing unauthorized packets to leave the network
Not allowing unauthorized packets entering the network
points
This can be used to identify DoS Attacks:
SHA-1
Cusum
MD5
SHA-256
Question 0/5
2 points
Which of the following are password cracking techniques? (choose all
that apply)
Dictionary Attacks
Guessing
Brute Force Attacks
Hybrid Attack
Question 0/5
3 points
Which of the following are true when referring to the term
phlashing? (choose all that apply)
A type of permanent Denial of Service
Something that can cause a device to render hardware inoperable
Can be known as bricking
An email attack in which the user is enticed to click on links
,Question 0/5
4 points
BlackShades Net can best be described as a:
DDoS Tool
Bot
Wrapper
RAT
Question 0/5
5 points
It was publicized that BlackShades Net was used as an attack tool
against:
Sony Pictures
Target
RSA
Syrian Political Activists
Question 0/5
6 points
During this type of an attack, the attacker takes over a DNS server
and changes the DNS settings so that all the requests coming to the
target web server are directed to the attacker’s own malicious
servers.
Session Hijacking
Denial of DNS (DoD)
Web Server Hijacking
, DNS Hijacking
Question 0/5
7 points
What three things happen when a distributed reflective denial of
service attack (DRDoS) is used?
Traffic will be directed to secondary victims
The source Address will be spoofed
Traffic will be directed to intermediate hosts
Traffic to the secondary hosts will originate from the intermediate hosts
Question 0/5
8 points
Which of following items does a DNS Amplification Attack take
advantage of?
DNS Recursive Method
DNS Reverse Lookup
Host file
DNS zone transfer
Question 0/5
9 points
What does Permutation Scanning utilize to find new machines?
Looking for new vulnerable machines on the local subnet
Using a pseudorandom permutation list
Using information from infected machines
, Collecting a list of possibly vulnerable machines
Question 0/5
10 points
To crash a webserver, what should an attacker target? (Select all that
apply)
Database space
Server Memory
CPU
Network Bandwidth
Question 0/5
11 points
Which DOS tool(s) work(s) from a mobile platform? (check all that
apply)
LOIC
AnDOSid
HULK
DOSSIM
Question 0/5
12 points
Egress filtering includes which of the following (choose all that apply):
Scanning packet headers of IP packets leaving the network
Not allowing unauthorized packets to leave the network
Not allowing unauthorized packets entering the network