connect and protect networks and network security coursera weekly challenge 3 answers

Test your knowledge: Secure networks against Denial of Service (DoS) attacks

1. What type of attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic?

  • Phishing attack
  • Tailgating attack
  • Denial of Service (DoS) attack
  • Distributed Denial of Service (DDoS) attack

2. What type of attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake?

  • SYN flood attack
  • ICMP flood
  • On-path attack
  • SYN-ACK flood attack

3. Fill in the blank: The Denial of Service (DoS) attack _____ is caused when a hacker sends a system an ICMP packet that is bigger than 64KB.

  • On-path
  • SYN flood
  • Ping of Death
  • ICMP flood

4. Which types of attacks take advantage of communication protocols by sending an overwhelming number of requests to a server? Select all that apply.

  • DDoS attack
  • ICMP flood attack
  • SYN flood attack
  • TCP connection attack

Test your knowledge: Network interception attack tactics

5. Passive packet sniffing involves data packets being manipulated while in transit, which may include injecting internet protocols to redirect the packets to unintended ports or changing the information the packet contains.

  • True
  • False

6. Fill in the blank: A security analyst can protect against malicious packet sniffing by _____ to encrypt data as it travels across a network.

  • using only websites with HTTP at the beginning of their domain addresses
  • using a VPN
  • using a network hub
  • using free public Wi-Fi

7. Which type of attack involves an attacker changing the source IP of a data packet to impersonate an authorized system and gain access to the network?

  • Replay attack
  • IP spoofing
  • On-path attack
  • Ping of death

8. Which of the following statements accurately describes a smurf attack?

  • A DoS attack that is caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than the maximum size
  • A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with packets
  • A network attack performed when an attacker intercepts a data packet in transit and delays it or repeats it at another time
  • A DoS attack performed by an attacker repeatedly sending ICMP packets to a network server

Shuffle Q/A 1

Weekly challenge 3

9. What happens during a Denial of Service (DoS) attack?

  • The target crashes and normal business operations cannot continue.
  • The data packets containing valuable information are stolen as they travel across the network.
  • The attacker successfully impersonates an authorized user and gains access to the network.
  • The network is infected with malware.

10. Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.

  • In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
  • A DDoS attack involves multiple hosts carrying out the attack.
  • A DoS attack involves one host conducting the attack.
  • A network device experiencing a DoS attack is unable to respond to legitimate users.

Leave a Reply