CS6262- Network Security exam with |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
correct answers |||\\\
DOS attack classification- Hitlist Scanning - correct answersA portion of a list of targets is supplied to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
a compromised computer
|||\\\ |||\\\
DOS attack classification - Permutation Scanning - correct answersAll compromised computers share a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
common pseudo-random permutation of the |||\\\ |||\\\ |||\\\ |||\\\
IP address space.
|||\\\ |||\\\
DOS attack classification - Signpost Scanning - correct answersUses the communication patterns of the
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
compromised computer to find new target. |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
DOS attack classification- Random Scanning - correct answersEach compromised computer probes
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
random addresses |||\\\
DOS attack classification - Random Spoofing - correct answersGenerate 32-bit numbers and stamp
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
packets with them. |||\\\ |||\\\
DOS attack classification - Subnet Spoofing - correct answersGenerate random addresses within
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
a given address space.
|||\\\ |||\\\ |||\\\
DOS attack classification - Fixed Spoofing - correct answersThe spoofed address is the address
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
of the target.
|||\\\ |||\\\
DOS attack classification - Infrastructure attack - correct answersThe motivation of this attack is a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
crucial service of a global internet
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\
, operation, for example core router |||\\\ |||\\\ |||\\\ |||\\\
DOS attack classification - Server Application - correct answersThe attack is targeted to a specific
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
application on a server |||\\\ |||\\\ |||\\\
DOS attack classification -Network Access - correct answersThe attack is used to overload or
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
crash the communication mechanism of a |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
network.
Amplification DOS attack - correct answersAmplification DOS Attack means that the attacker only |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
needs to send a small number of packets and can achieve a big effect such as rendering the targeted
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
site unavailable. |||\\\
Types of amplification attacks. - correct answersDoS bug and DOS flood. Denial of service bug and
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
denial of service flood |||\\\ |||\\\ |||\\\
DoS bug - correct answersDoS attack designed to exploit a bug say a design flaw or vulnerability, an
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
implementation error on the server. The attacker machine can send a few packets that contain input |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
that would trigger the bug and then crash the server rendering it unavailable
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
NTP (Network Time Protocol) - correct answersAn UDP based Internet protocol that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
synchronization of computer clock times in a network of computers by exchanging time signals. (UDP |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
123)
Why is NTP vulnerable to amplification attacks? - correct answers
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Internet Protocol (IP) - correct answersThe network protocol that deals with the routing of packets
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
through interconnected networks to the final destination. A communication standard that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
computers to route communications traffic from one network to another as needed. It is |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
connectionless, unreliable and best effort based. Each packet will find it's way to destination and there |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
is no mechanism to ensure that all packets will arrive properly and in sequence
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
correct answers |||\\\
DOS attack classification- Hitlist Scanning - correct answersA portion of a list of targets is supplied to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
a compromised computer
|||\\\ |||\\\
DOS attack classification - Permutation Scanning - correct answersAll compromised computers share a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
common pseudo-random permutation of the |||\\\ |||\\\ |||\\\ |||\\\
IP address space.
|||\\\ |||\\\
DOS attack classification - Signpost Scanning - correct answersUses the communication patterns of the
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
compromised computer to find new target. |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
DOS attack classification- Random Scanning - correct answersEach compromised computer probes
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
random addresses |||\\\
DOS attack classification - Random Spoofing - correct answersGenerate 32-bit numbers and stamp
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
packets with them. |||\\\ |||\\\
DOS attack classification - Subnet Spoofing - correct answersGenerate random addresses within
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
a given address space.
|||\\\ |||\\\ |||\\\
DOS attack classification - Fixed Spoofing - correct answersThe spoofed address is the address
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
of the target.
|||\\\ |||\\\
DOS attack classification - Infrastructure attack - correct answersThe motivation of this attack is a
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
crucial service of a global internet
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\
, operation, for example core router |||\\\ |||\\\ |||\\\ |||\\\
DOS attack classification - Server Application - correct answersThe attack is targeted to a specific
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
application on a server |||\\\ |||\\\ |||\\\
DOS attack classification -Network Access - correct answersThe attack is used to overload or
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
crash the communication mechanism of a |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
network.
Amplification DOS attack - correct answersAmplification DOS Attack means that the attacker only |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
needs to send a small number of packets and can achieve a big effect such as rendering the targeted
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
site unavailable. |||\\\
Types of amplification attacks. - correct answersDoS bug and DOS flood. Denial of service bug and
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
denial of service flood |||\\\ |||\\\ |||\\\
DoS bug - correct answersDoS attack designed to exploit a bug say a design flaw or vulnerability, an
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
implementation error on the server. The attacker machine can send a few packets that contain input |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
that would trigger the bug and then crash the server rendering it unavailable
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
NTP (Network Time Protocol) - correct answersAn UDP based Internet protocol that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
synchronization of computer clock times in a network of computers by exchanging time signals. (UDP |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
123)
Why is NTP vulnerable to amplification attacks? - correct answers
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Internet Protocol (IP) - correct answersThe network protocol that deals with the routing of packets
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
through interconnected networks to the final destination. A communication standard that enables
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
computers to route communications traffic from one network to another as needed. It is |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
connectionless, unreliable and best effort based. Each packet will find it's way to destination and there |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
is no mechanism to ensure that all packets will arrive properly and in sequence
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\