question archive Question 1 Denial of service is all about crippling a resource so it cannot provide a service
Subject:Computer SciencePrice: Bought3
Question 1
Denial of service is all about crippling a resource so it cannot provide a service.
A. True
B. False
Question 2
A purposeful attack on a network or resource to prevent legitimate access is known as ____________.
A. Social Engineering
B. DoS
C. DoC
D. Wardriving
Question 3
_______________ machines on the internet have been infected to allow remote control and are used in a distributed denial of service attack.
A. Werewolf
B. Vampire
C. Zombie
D. Skeleton Warrior
Question 4
A type of DoS that overwhelms a server with TCP SYN segments from a spoofed source is known as ___________.
A. Service Request Floods
B. Syn Floods
C. ICMP Floods
D. Application-Level DoS
Question 5
Malformed data is used in ______________________ DoS to cause a buffer overflow rendering the service unavailable.
A. Service Request Flood
B. Syn Floods
C. Application Level
D. ICMP Flood
Question 6
In a permanent DoS, the term ________________ means to installed compromised hardware updates to permanently brick a device rendering it useless.
A. Flashing
B. Phlashing
C. Phreaking
D. Spoofing
Question 7
______________ are primarily used when initiating a distributed denial of service attack.
A. Honeypots
B. cybernets
C. Zombienets
D. Botnets
Question 8
Which of the following is a denial of service attack tool?
A. Gimli's Axe
B. Tor's Hammer
C. Hashcat
D. Burpy
Question 9
In DoS detection, ____________________ can be used to detect an abnormal bump in network traffic if a baseline exists.
A. Activity Profiling
B. Absorbing
C. Degrading
D. Total Shutdown
Question 10
In a pen test, DoS attacks should be done in a scheduled window to prevent unwanted downtime and/or loss of revenue.
A. True
B. False