Preview

07 - Denial of Service

 1. A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.

  TRUE

  FALSE

 2. An attack like this occurs when multiple systems flood the bandwidth of a targeted system, usually one or more _________.

  web servers

  website html pages

  client machines

  individuals (humans)

 3. Panix, the third-oldest ISP in the world, was the target of what is thought to be the first DoS attack. This was in the year 1996.

  FALSE

  TRUE

 4. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from _________.

  a human and not a computer.

  many different sources.

  only two sources, each in the same location.

  a single source.

 5. The above scenario effectively makes it impossible to stop the attack simply by ______________________.

  blocking a single source.

  visiting people's homes.

  blocking the ISPs packet switching network.

  asking for permission.

 6. Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways.

  TRUE

  FALSE

 7. Revenge, blackmail and activism is never likely to be the reason behind any of these attacks.

  TRUE

  FALSE

 8. A _________________ attack typically involves more than around 3?5 nodes on different networks; fewer nodes may qualify as a DoS attack but is not a DDoS attack.

  distributed denial of service

  denegrated service

  disintegrated systems

  disinfected serial

 9. The simplest DoS attack relies primarily on ________, flooding the target with an overwhelming flux of packets, depleting the target's system resources.

  vulnerabilities in government security

  careful physical intervention on the client side

  sql injections

   brute force

 10. A SYN flood occurs when a host sends a flood of__________________ often with a forged sender address.

  MAC addresses

   TCP/SYN packets,

  physical letters in the post

  TCP/IP procotols