Page 113 - StudyBook.pdf
P. 113
General Security Concepts: Attacks • Chapter 2 97
A. Worm
B. Spyware
C. Logic Bomb
D. DDoS
4. The mail server is receiving a large number of spam e-mails and users have
hundreds of unwanted messages in their mailbox.What kind of attack are you
receiving?
A. A rootkit
B. A DoS flooding attack
C. A virus
D. A Logic bomb
5. You suspect your network was under a SYN Attack last night.The only data
you have is a session captured by a sniffer on the affected network.Which of
the following conditions is a sure-tell sign that a SYN attack is taking place?
A. A very large number of SYN packets.
B. Having more SYN | ACK packets in the network than SYN packets.
C. Having more SYN | ACK packets in the network than ACK packets.
D. Having more ACK packets in the network than SYN packets.
6. While analyzing your logs, you notice that internal IPs are being dropped,
because they are trying to enter through the Internet connection.What type
of attack is this?
A. DoS
B. MITM
C. Replay Attack
D. IP Spoofing
7. Your Chief Executive Officer (CEO) practices complete password security. He
changes the password every 30 days, uses hard-to-guess, complex, 10-character
passwords with lowercase, uppercase, numbers and special symbols, and never
writes them down anywhere. Still, you have discovered a hacker that for the
past year has been using the CEO’s passwords to read his e-mail.What’s the
likely culprit behind this attack.
www.syngress.com