11. A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?
- The port numbers in the data packets are incorrect.
- A large number of ICMP packets are delivered to the organization’s servers.
- An oversized ICMP packet is sent to the network server.
- The server has stopped responding after receiving an unusually high number of incoming SYN packets.
12. Fill in the blank: The DoS attack _____ occurs when a malicious actor sends an oversized ICMP packet to a server.
- smurf
- SYN flood
- Ping of Death
- on-path
13. Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
- Using only websites with HTTPS at the beginning of their domain names provides protection from packet sniffing.
- Passive packet sniffing may enable attackers to change the information a packet contains.
- Active packet sniffing may enable attackers to redirect the packets to unintended ports.
- The purpose of passive packet sniffing is to read data packets while in transit.
14. As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?
- Ping of death
- SYN flooding
- Packet sniffing
- IP spoofing
15. Fill in the blank: _____ is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.
- A KRACK attack
- A DoS attack
- IP spoofing
- SYN flooding
16. In which attack do malicious actors impersonate a web browser or web server by placing themselves between the two devices, then sniffing the packet information to discover their IP and MAC addresses?
- Packet flooding attack
- On-path attack
- Malware attack
- Smurf attack
17. Fill in the blank: The _____ network attack occurs when a malicious actor takes a network transmission that was sent by an authorized user and repeats it at a later time to impersonate that user.
- SYN floodÂ
- smurf
- on-pathÂ
- replay
18. Which combination DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?
- On-path attack
- Replay attack
- Ping of Death
- Smurf attack
Shuffle Q/A 2
19. What is the main objective of a Denial of Service (DoS) attack?
- Simulate a TCP connection and flood a server with SYN packets
- Send oversized ICMP packets
- Disrupt normal business operations
- Repeatedly send ICMP packets to a network server
20. A security team discovers that an attacker has taken advantage of the handshake process that is used to establish a TCP connection between a device and their server. Which DoS attack does this scenario describe?
- ICMP flood
- On-path attack
- SYN flood attack
- Ping of Death