11. A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?

  • The port numbers in the data packets are incorrect.
  • A large number of ICMP packets are delivered to the organization’s servers.
  • An oversized ICMP packet is sent to the network server.
  • The server has stopped responding after receiving an unusually high number of incoming SYN packets.

12. Fill in the blank: The DoS attack _____ occurs when a malicious actor sends an oversized ICMP packet to a server.

  • smurf
  • SYN flood
  • Ping of Death
  • on-path

13. Which of the following statements correctly describe passive and active packet sniffing? Select three answers.

  • Using only websites with HTTPS at the beginning of their domain names provides protection from packet sniffing.
  • Passive packet sniffing may enable attackers to change the information a packet contains.
  • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
  • The purpose of passive packet sniffing is to read data packets while in transit.

14. As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?

  • Ping of death
  • SYN flooding
  • Packet sniffing
  • IP spoofing

15. Fill in the blank: _____ is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.

  • A KRACK attack
  • A DoS attack
  • IP spoofing
  • SYN flooding

16. In which attack do malicious actors impersonate a web browser or web server by placing themselves between the two devices, then sniffing the packet information to discover their IP and MAC addresses?

  • Packet flooding attack
  • On-path attack
  • Malware attack
  • Smurf attack

17. Fill in the blank: The _____ network attack occurs when a malicious actor takes a network transmission that was sent by an authorized user and repeats it at a later time to impersonate that user.

  • SYN flood 
  • smurf
  • on-path 
  • replay

18. Which combination DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?

  • On-path attack
  • Replay attack
  • Ping of Death
  • Smurf attack

Shuffle Q/A 2

19. What is the main objective of a Denial of Service (DoS) attack?

  • Simulate a TCP connection and flood a server with SYN packets
  • Send oversized ICMP packets
  • Disrupt normal business operations
  • Repeatedly send ICMP packets to a network server

20. A security team discovers that an attacker has taken advantage of the handshake process that is used to establish a TCP connection between a device and their server. Which DoS attack does this scenario describe?

  • ICMP flood
  • On-path attack
  • SYN flood attack
  • Ping of Death

Leave a Reply