Question

Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select...

Question 1

Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select all that apply only 3 answers are correct.

1. DDoS attacks often include a network of compromised systems to form a botnet.

2. In reflector attacks, intermediary systems are often chosen to be high-capacity servers to generate high volume of response packets.

3. Both reflector and amplifier attacks require intermediaries with a spoofed source address of the attacker's machine.

4. Common services used in amplifier attacks include ICMP and TCP/UDP.

5. One possible defence against amplifier attacks is to not allow directed broadcasts to be routed into a network from outside.

Question 2

Which of the following statements about DoS attacks is correct? Select all that apply only 2 answers are correct.

1. Source address spoofing is commonly used in DoS attacks to hide attacker's identity.

2. Ingress filtering on routers near the target system could be used as countermeasure against source address spoofing.

3. SYN spoofing attack aims at overloading the network capacity on the link to a server by generating a large number of SYN connection requests with forged source addresses.

4. Ping of death attack sends malformed packets using ping command with spoofed source address

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Please Note: I have answered the first Question, according to HOMEWORKLIB RULES. Please Re-Post for receiving answers on the other questions.

Answer)
Q1. The following are the valid statements about DDoS, reflector, and amplifier attacks:

1. DDoS attacks often include a network of compromised systems to form a botnet.

2. In reflector attacks, intermediary systems are often chosen to be high-capacity servers to generate high volume of response packets.

5. One possible defense against amplifier attacks is to not allow directed broadcasts to be routed into a network from outside.

This is because the reflector attacks use the high-capacity server, DDoS uses network of compromised systems, and to defend against amplifier attacks we need to block directed broadcasts routed from outside.

**Please Hit Like if you appreciate my answer. For further doubts on the or answer please drop a comment, I'll be happy to help. Thanks for posting.**

Add a comment
Know the answer?
Add Answer to:
Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1 Which of the following statements about DoS attacks is correct? Select all that apply...

    Question 1 Which of the following statements about DoS attacks is correct? Select all that apply only 2 answers are correct. 1. Source address spoofing is commonly used in DoS attacks to hide attacker's identity. 2. Ingress filtering on routers near the target system could be used as countermeasure against source address spoofing. 3. SYN spoofing attack aims at overloading the network capacity on the link to a server by generating a large number of SYN connection requests with forged...

  • network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] ||...

    network security questions Which of the following PGP cryptographic function provides authentication only? E[PUB, Ks] || E[KS, ZEM || E[PRа, H(M)]]] O None O E[PUB, Ks]||E[KS, Z(M)] O Z[M|| E[PRа, H(M)] Which of the following statement is true for the equation E[H[PI), PRI) in PGP? Public key of the sender is recovered by using hash of the passphrase Private key of the recipient is recovered in public key ring using hash of the passphrase Public key of the recipient is...

  • 1. Which of the following statements regarding the black-box approach for systems auditing is correct? Multiple...

    1. Which of the following statements regarding the black-box approach for systems auditing is correct? Multiple Choice The auditors need to gain detailed knowledge of the systems' internal logic. The black-box approach could be adequate when automated systems applications are complicated. The auditors first calculate expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results. All of these answers are correct. 2.Which statements are incorrect about virtual private network...

  • answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...

    answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT