Page 113 - StudyBook.pdf
P. 113

General Security Concepts: Attacks • Chapter 2  97

                      A. Worm

                      B. Spyware
                      C. Logic Bomb
                      D. DDoS


                  4. The mail server is receiving a large number of spam e-mails and users have
                      hundreds of unwanted messages in their mailbox.What kind of attack are you
                      receiving?

                      A. A rootkit
                      B. A DoS flooding attack
                      C. A virus
                      D. A Logic bomb


                  5. You suspect your network was under a SYN Attack last night.The only data
                      you have is a session captured by a sniffer on the affected network.Which of
                      the following conditions is a sure-tell sign that a SYN attack is taking place?

                      A. A very large number of SYN packets.
                      B. Having more SYN | ACK packets in the network than SYN packets.
                      C. Having more SYN | ACK packets in the network than ACK packets.

                      D. Having more ACK packets in the network than SYN packets.

                  6. While analyzing your logs, you notice that internal IPs are being dropped,
                      because they are trying to enter through the Internet connection.What type
                      of attack is this?
                      A. DoS
                      B. MITM

                      C. Replay Attack
                      D. IP Spoofing

                  7. Your Chief Executive Officer (CEO) practices complete password security. He
                      changes the password every 30 days, uses hard-to-guess, complex, 10-character
                      passwords with lowercase, uppercase, numbers and special symbols, and never
                      writes them down anywhere. Still, you have discovered a hacker that for the
                      past year has been using the CEO’s passwords to read his e-mail.What’s the
                      likely culprit behind this attack.


                                                                              www.syngress.com
   108   109   110   111   112   113   114   115   116   117   118