Filters
Question type

Study Flashcards

The standard protocol used for call setup in VoIP is the ________ Protocol.

Correct Answer

verifed

verified

Session Initiation

Since filtering needs to be done as close to the source as possible by routers or gateways knowing the valid address ranges of incoming packets,an _______ is best placed to ensure that valid source addresses are used in all packets from its customers.

Correct Answer

verifed

verified

_______ is a text-based protocol with a syntax similar to that of HTTP.


A) RIP
B) DIP
C) SIP
D) HIP

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

It is possible to specifically defend against the ______ by using a modified version of the TCP connection handling code.


A) three-way handshake
B) UDP flood
C) SYN spoofing attack
D) flash crowd

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses is known as _______ traffic.

Correct Answer

verifed

verified

If an organization is dependent on network services it should consider mirroring and ________ these servers over multiple sites with multiple network connections.

Correct Answer

verifed

verified

A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.


A) echo
B) reflection
C) poison packet
D) flash flood

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

______ attacks are a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

Correct Answer

verifed

verified

A _______ flood refers to an attack that bombards Web servers with HTTP requests.

Correct Answer

verifed

verified

SYN-ACK and ACK packets are transported using IP,which is an unreliable network protocol.

A) True
B) False

Correct Answer

verifed

verified

A characteristic of reflection attacks is the lack of _______ traffic.


A) backscatter
B) network
C) three-way
D) botnet

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A

_____ attacks flood the network link to the server with a torrent of malicious packets competing with valid traffic flowing to the server.

Correct Answer

verifed

verified

The attacker needs access to a high-volume network connection for a SYN spoof attack.

A) True
B) False

Correct Answer

verifed

verified

A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service.

A) True
B) False

Correct Answer

verifed

verified

To respond successfully to a DoS attack a good ______ plan is needed that includes details of how to contact technical personal for your ISP(s).

Correct Answer

verifed

verified

In reflection attacks,the ______ address directs all the packets at the desired target and any responses to the intermediary.

Correct Answer

verifed

verified

There is very little that can be done to prevent a flash crowd.

A) True
B) False

Correct Answer

verifed

verified

True

Flooding attacks take a variety of forms based on which network protocol is being used to implement the attack.

A) True
B) False

Correct Answer

verifed

verified

Requests and _______ are the two different types of SIP messages.

Correct Answer

verifed

verified

______ relates to the capacity of the network links connecting a server to the wider Internet.


A) Application resource
B) Network bandwidth
C) System payload
D) Directed broadcast

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer