CMIT 321 Quiz 4
Question 1 points
This category of DoS/DDoS attack consumes the connection state tables present in load balancers,
firewall and application servers.
Volumetric
TCP State-Exhaustion
Fragmentation
Application Layer
Question 5/5
2 points
According to your text, most of the webservers run which of the following?
NGINX
Google
Apache
Microsoft IIS
Question 5/5
3 points
,Tor's hammer will kill Apache 1X with less than:
128 threads
64 threads
256 threads
16 threads
Question 5/5
4 points
Tor's hammer will kill Apache 2X with less than:
16 threads
64 threads
256 threads
128 threads
Question 3.
5 points
What are the 3 techniques that can be utilized to propagate malicious code?
Back Dating
Back Chaining
, Central Source
Autonomous
5/5
Question 6
points
LOIC will kill the server with (choose all that apply):
TCP Requests
ICMP Requests
HTTP Requests
UDP Requests
Question 5/5
7 points
When an attacker is performing a denial of service and a SYN attack is initiated which of the following
things happens? (choose all that apply)
A large number of ACK packets is sent to the target
A fake source address is used
A large number SYN requests is sent to the target
The actual source address is used
, Question 5/5
8 points
In a Session Fixation Attack the attack tricks the user into accessing an authentic webserver using
a(n) value?
Cookie
Explicit session ID
Cloned session
Hash
Question 5/5
9 points
A attack is a large-scale, coordinated attack on a target system or network resources, launched
indirectly through many compromised systems.
Session Hijacking
Pen Test
Denial of Service (Dos)
Distributed Denial of Service (DDoS)
Question 5/5
10 points
To crash a webserver, what should an attacker target? (Select all that apply)
Question 1 points
This category of DoS/DDoS attack consumes the connection state tables present in load balancers,
firewall and application servers.
Volumetric
TCP State-Exhaustion
Fragmentation
Application Layer
Question 5/5
2 points
According to your text, most of the webservers run which of the following?
NGINX
Apache
Microsoft IIS
Question 5/5
3 points
,Tor's hammer will kill Apache 1X with less than:
128 threads
64 threads
256 threads
16 threads
Question 5/5
4 points
Tor's hammer will kill Apache 2X with less than:
16 threads
64 threads
256 threads
128 threads
Question 3.
5 points
What are the 3 techniques that can be utilized to propagate malicious code?
Back Dating
Back Chaining
, Central Source
Autonomous
5/5
Question 6
points
LOIC will kill the server with (choose all that apply):
TCP Requests
ICMP Requests
HTTP Requests
UDP Requests
Question 5/5
7 points
When an attacker is performing a denial of service and a SYN attack is initiated which of the following
things happens? (choose all that apply)
A large number of ACK packets is sent to the target
A fake source address is used
A large number SYN requests is sent to the target
The actual source address is used
, Question 5/5
8 points
In a Session Fixation Attack the attack tricks the user into accessing an authentic webserver using
a(n) value?
Cookie
Explicit session ID
Cloned session
Hash
Question 5/5
9 points
A attack is a large-scale, coordinated attack on a target system or network resources, launched
indirectly through many compromised systems.
Session Hijacking
Pen Test
Denial of Service (Dos)
Distributed Denial of Service (DDoS)
Question 5/5
10 points
To crash a webserver, what should an attacker target? (Select all that apply)