What best describes a DoS attack?
What best describes a DoS attack? attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use poses as legitimate software…
What best describes a DoS attack? attempts to consume all of a critical computer or network resource in order to make it unavailable for valid use poses as legitimate software…
Which two attacks can be caused by a rogue DHCP server? (Choose two.) Trojan virus Compromised-Key DoS TCP SYN flood MITM Explanation & Hint: Two attacks that can be caused…
Which two are software vulnerability scanners? (Choose two.) VmStat Nessus fingerprint open VAS Explanation & Hint: Two examples of software vulnerability scanners are: Nessus Nessus is a widely known and…
What best describes an attack vector? the resolution of an attack a path, method, or route by which an attack was carried out the result of, or damage from, an…
What two are examples of UDP-based attacks? (Choose two.) SYN flood SQL slammer UDP flooding MAC address flooding Explanation & Hint: Two examples of UDP (User Datagram Protocol) based attacks…
What type of attack occurs when the attacker spoofs the IP address of the victim, sending a continuous stream of small requests, which produce a continuous stream of much larger…
What best describes an attack surface? a way to classify which tools were used in an attack the sum of the different points (attack vectors) in a given computing device…
Which two of the following statements are true regarding early TCP/IP development? (Choose two.) TCP/IP was the only network protocol suite available and was developed for internet work environments. The…
What type of attack occurs when an attacker sends a flood of protocol request packets to various IP hosts and the attacker spoofs the source IP address of the packets,…
What is an example of a reconnaissance attack tool that will cycle through all well-known ports to provide a complete list of all services that are running on the hosts?…
Which protocol or diagnostic tool helps you determine how many hops away a network is and can be exploited by an attacker? SSH traceroute ping TCP Explanation & Hint: The…
What phase of the TCP communication process is attacked during a TCP SYN flood attack? three-way handshake connection established connection closed connection reset Explanation & Hint: A TCP SYN flood…
What type of spoofing attack uses fake source IP addresses that are different than their real IP addresses? MAC spoofing IP spoofing application spoofing name spoofing Explanation & Hint: The…
A ping attack that exploits the broadcast IP address in a subnet is referred to as what type of attack? red rat Fraggle smurf SYN flood firewalk Explanation & Hint:…
What type of IP attack occurs when an attacker inserts itself into a communication session and then takes over the session? MAC address flooding attack session hijacking DHCP depletion attack…
Which part of the UDP header would attackers replace if they change the data payload to prevent the receiver from identifying the change? source port destination port UDP length UDP…
What two types of attacks are examples of ICMP DoS attacks? (Choose two.) smurf attack blooming onion attack ping of death attack DHCP depletion attack Explanation & Hint: Two types…
What best describes an amplification attack? A low volume of bad music is played progressively louder to the point that it becomes unbearable for people to listen to it. A…
Which three types of devices can do network address translation (NAT)? (Choose three.) routers Layer 3 switches bridges wireless access points firewalls Explanation & Hint: The three types of devices…
How can the established keyword in an ACL entry be used? to permit only the returning TCP packets from an already existing TCP connection, and deny the initial TCP packet of a…