• Post author:
  • Post category:Blog
  • Reading time:5 mins read
  • Post last modified:June 12, 2024

Match the attack type with the respective description.

Match the attack type with the respective description
Match the attack type with the respective description
  • Reflected DOS ==> This attack uses spoofed packets that appear to be from the victim. Then the sources become unwitting participants in the attack by sending the response traffic back to the intended victim.
  • DNS Amplification ==> This an attack in which the attacker exploits vulnerabilities in target servers to initially turn small queries into much larger payloads, which are used to bring down the servers of the victim.
  • Direct DOS ==> This occurs when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.
  • DDOS ==> This attack uses botnets that can be manipulated from a command and control (CnC, or C2) system.

Explanation & Hint:

Place the options in the following order:

Reflected DOS This attack uses spoofed packets that appear to be from the victim. Then the sources become unwitting participants in the attack by sending the response traffic back to the intended victim.
DNS Amplification This an attack in which the attacker exploits vulnerabilities in target servers to initially turn small queries into much larger payloads, which are used to bring down the servers of the victim.
Direct DOS This occurs when the source of the attack generates the packets, regardless of protocol, application, and so on, that are sent directly to the victim of the attack.
DDOS This attack uses botnets that can be manipulated from a command and control (CnC, or C2) system.

 

For more Questions and Answers:

5.3.3 Quiz – Exploiting Wired and Wireless Networks Answers Full 100%

 

Match the attack type with the respective description.

Match the attack type with the respective description 02
Match the attack type with the respective description 02
  • Route Manipulation attacks ==> Typically a BGP hijacking attack by configuring or compromising an edge router to announce prefixes that have not been assigned to the organization
  • Downgrade attacks ==> The attacker forces a system to favor a weak encryption protocol or hashing algorithm that may be susceptible to other vulnerabilities
  • DHCP Starvation attack ==> An attacker floods a server with bogus DISCOVER packets until the server exhausts the supply of IP addresses
  • VLAN Hopping attack ==> An attacker bypass any layer 2 restrictions built to divide hosts
  • MAC address spoofing attack ==> An attacker spoofs the physical address of the NIC device to match the address of another on a network in order to gain unauthorized access or launch a Man-in-the-Middle attack

Explanation & Hint:

Place the options in the following order:

Route Manipulation attacks Typically a BGP hijacking attack by configuring or compromising an edge router to announce prefixes that have not been assigned to the organization
Downgrade attacks The attacker forces a system to favor a weak encryption protocol or hashing algorithm that may be susceptible to other vulnerabilities
DHCP Starvation attack An attacker floods a server with bogus DISCOVER packets until the server exhausts the supply of IP addresses
VLAN Hopping attack An attacker bypass any layer 2 restrictions built to divide hosts
MAC address spoofing attack An attacker spoofs the physical address of the NIC device to match the address of another on a network in order to gain unauthorized access or launch a Man-in-the-Middle attack

For more Questions and Answers:

5.3.3 Quiz – Exploiting Wired and Wireless Networks Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments