100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

NETSEC All Final Exam Guide Questions with Answer Graded A+ 2025/2026

Puntuación
-
Vendido
-
Páginas
51
Grado
A+
Subido en
06-02-2025
Escrito en
2024/2025

NETSEC All Final Exam Guide Questions with Answer Graded A+ 2025/2026 6) "Breadth of the perimeter" is a phrase used by network administrators to convey that creating a 100% secure network is possible. Answer: - FALSE 7) DoS network attacks are fairly uncommon. Answer - FALSE 8) A DoS attack makes a server or network unavailable by flooding it with attack packets. Answer - TRUE 9) The ultimate goal of a DoS attack is to ________. A) cause harm B) frustrate users C) practice hacking D) None of the above Answer - A 10) DoS attacks can cause harm by ________. A) stopping a critical service B) slowly degrading services over a period of time C) Both A and B D) Neither A nor B

Mostrar más Leer menos
Institución
NETSEC
Grado
NETSEC











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
NETSEC
Grado
NETSEC

Información del documento

Subido en
6 de febrero de 2025
Número de páginas
51
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

NETSEC All Final Exam Guide Questions with Answer
Graded A+ 2025/2026
6) "Breadth of the perimeter" is a phrase used by network administrators to convey that
creating a 100% secure network is possible.
Answer: - FALSE

7) DoS network attacks are fairly uncommon.
Answer - FALSE

8) A DoS attack makes a server or network unavailable by flooding it with attack
packets.
Answer - TRUE

9) The ultimate goal of a DoS attack is to ________.
A) cause harm
B) frustrate users
C) practice hacking
D) None of the above
Answer - A

10) DoS attacks can cause harm by ________.
A) stopping a critical service
B) slowly degrading services over a period of time
C) Both A and B
D) Neither A nor B
Answer - C

11) A direct attack occurs when an attacker tries to flood a victim with a stream of
packets directly from the attacker's computer.
Answer - TRUE

12) An indirect attack occurs when an attacker tries to flood a victim with a stream of
packets directly from the attacker's computer.
Answer - FALSE

13) Similar to a direct attack, an indirect attack occurs when an attacker spoofs his/her
IP address.
Answer - TRUE


14) ________ is the process of obscuring an attackers source IP address.
A) Backscatter
B) Spoofing
C) IP Flood
D) None of the above
Answer: - B

,15) A ________ attack is when a victim is flooded with SYN packets in an attempt to
make many half-open TCP connections.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Answer - A

16) A ________ attack is when a victim is flooded with ICMP packets that appear to be
normal supervisory traffic.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Answer - B

17) A ________ attack is when a webserver is flooded with application layer web
requests.
A) SYN flood
B) Ping flood
C) HTTP flood
D) None of the above
Answer - C

18) ICMP can be best described as the second part of a three-way TCP handshake
sent in response to a SYN.
Answer - FALSE

19) SYN-ACK can be best described as the second part of a three-way TCP handshake
sent in response to a SYN.
Answer - TRUE


20) ________ are compromised hosts running malware controlled by the hacker.
A) DDoS
B) ICMP
C) Bots
D) None of the above
Answer: - C

21) An attacker controlling bots in a coordinated attack against a victim is known as a
________.
A) DoS attack
B) DDoS attack
C) ICMP

,D) None of the above.
Answer - B

22) Once established, botnets can be leased to other criminals for DoS attacks.
Answer - TRUE

23) ________ are an additional layer of compromised hosts that are used to manage
large groups of bots.
A) Botnets
B) Handlers
C) Phatbots
D) None of the above
Answer - B

24) In a P2P attack, there is a change in the overall volume of traffic but the traffic
pattern is the same.
Answer - FALSE

25) In a P2P attack, there is a change in traffic pattern but the overall volume of traffic is
the same.
Answer - TRUE

26) Listing your friend's home in the local classifieds at a low price is equivalent to a
________.
A) P2P redirect
B) P2P port
C) DDoS
D) None of the above
Answer - A

27) In a reflected DoS attack, attackers send spoofed requests to legitimate servers.
The servers then send all responses to the victim.
Answer - TRUE

28) In a smurf flood DoS attack, attackers can benefit from a multiplier effect because
multiple ICMP requests are responded to by a single host.
Answer - FALSE

29) In a smurf flood DoS attack, attackers can benefit from a multiplier effect because a
single ICMP request is responded to by multiple hosts.
Answer - FALSE

30) A ________ is an older attack that uses an illegally large IP packet to crash an
operating system.
A) smurf flood
B) P2P redirect

, C) ping of death
D) None of the above
Answer - C

31) Most DoS attacks are difficult to detect.
Answer - FALSE

32) ________ is one method of thwarting DoS attacks by dropping all IP packets from
an attacker.
A) Black holing
B) ICMP echo
C) P2P redirect
D) None of the above
Answer - A

33) A firewall does note set aside resources for a connection when a SYN segment
arrives, so handling a large number of false SYN segments is only a small burden.
Answer - TRUE

34) ________ is a good option if an attack is aimed at a single server because it keeps
transmission lines at least partially open for other communication.
A) Rate limiting
B) False open
C) Black holing
D) None of the above
Answer - A

35) ARP is used to resolve 48-bit IP addresses into 32-bit local MAC addresses.
Answer - FALSE

36) ARP is used to resolve 32-bit IP addresses into 48-bit local MAC addresses.
Answer - TRUE

37) Rerouting traffic using ARP poisoning is an attack on ________ of a network.
A) functionality
B) confidentiality
C) Both A and B
D) None of the above
Answer - C

38) One problem with ARP requests and replies is that they do not require
authentication of verification.
Answer - TRUE

39) In normal ARP traffic, generally an attacker on the same network cannot see traffic
between two hosts.
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BOARDWALK Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
176
Miembro desde
1 año
Número de seguidores
6
Documentos
22297
Última venta
3 días hace
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.6

32 reseñas

5
13
4
6
3
7
2
0
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes