CIS403_Quiz_3 - CIS403 Quiz#3 1. Define a Denial-of-Service...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS403 Quiz#3 1. Define a Denial-of-Service (DoS) attack An attempt to compromise availability by hindering or blocking completely the provisoin of some service. 2. What types of resources are targeted by DoS attacks? Network Bandwidth, System resources, and Application Resources. 3. What is the goal of a flooding attack? To overwhelm the capacity of the network connection to the target organization. 4. What types of packets are commonly used for flooding attacks? ICMP echo request packets. 5. Why do many DoS attacks use packets with spoofed source addresses? So that the Identity of the attacker cannot be solved. 6. Define a Distributed Denial of Service (DDoS) attack? Using many different machines to perform a Denial of Service attack, instead of just one machine. 7. What architecture does a DDoS attack typically use? A two-layer command Hierarchy. 8. Define a reflection attack. By using a spoofed source address a hacker will send packets to an intermediary which will then send return packets to the spoofed source address of the actual target. 9. Define an amplification attack.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/09/2011 for the course CIS CIS403 taught by Professor Mr.t during the Spring '11 term at ECPI College of Technology.

Page1 / 2

CIS403_Quiz_3 - CIS403 Quiz#3 1. Define a Denial-of-Service...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online