Filters
Question type

Study Flashcards

What is the sequence of packets for a successful three-way handshake?


A) SYN, ACK, ACK
B) SYN, SYN ACK, RST
C) SYN, SYN ACK, ACK
D) SYN, ACK, FIN

Correct Answer

verifed

verified

What is signature analysis?

Correct Answer

verifed

verified

Signature analysis is the prac...

View Answer

Which of the following is NOT a category of suspicious TCP/IP packet?


A) bad header information
B) single-packet attacks
C) suspicious data payload
D) suspicious CRC value

Correct Answer

verifed

verified

MATCHING -lets the other computer know it is finished sending data


A) back door
B) MTU
C) ping sweep
D) scan throttling
E) packet injection
F) signature
G) vanilla scan
H) RPC
I) FIN packet
J) RST packet

Correct Answer

verifed

verified

Packet fragmentation is not normal,and can only occur if an attack has been initiated.

Correct Answer

verifed

verified

An atomic attack is a barrage of hundreds of packets directed at a host.

Correct Answer

verifed

verified

MATCHING -the maximum packet size that can be transmitted


A) back door
B) MTU
C) ping sweep
D) scan throttling
E) packet injection
F) signature
G) vanilla scan
H) RPC
I) FIN packet
J) RST packet

Correct Answer

verifed

verified

List the four categories of suspicious traffic categories.

Correct Answer

verifed

verified

Informational
Reconn...

View Answer

What is the typical packet sequence for closing a TCP session?


A) FIN, FIN ACK, RST
B) FIN, ACK, FIN ACK, ACK
C) FIN ACK, FIN, ACK, RST
D) FIN, FIN ACK

Correct Answer

verifed

verified

Describe the purpose of the CVE and how it works.

Correct Answer

verifed

verified

The Common Vulnerabilities and Exposures...

View Answer

All devices interpret attack signatures uniformly.

Correct Answer

verifed

verified

The signature of a normal FTP connection includes a three-way handshake.

Correct Answer

verifed

verified

A TCP packet with no flags set is referred to as a _________ packet.

Correct Answer

verifed

verified

MATCHING -an undocumented hidden opening through which an attacker can access a computer


A) back door
B) MTU
C) ping sweep
D) scan throttling
E) packet injection
F) signature
G) vanilla scan
H) RPC
I) FIN packet
J) RST packet

Correct Answer

verifed

verified

What type of attack does a remote-access Trojan attempt to perpetrate?


A) worm
B) back door
C) remote denial of service
D) composite attack

Correct Answer

verifed

verified

Which of the following is the description of a land attack?


A) the local host source address occurs in the packet
B) source and destination IP address/port are the same
C) an illegal TCP flag is found in the segment header
D) the attacker uses an undefined protocol number

Correct Answer

verifed

verified

What is the term used when an IDPS doesn't recognize that an attack is underway?


A) false negative
B) true positive
C) negative activity
D) positive signature

Correct Answer

verifed

verified

Which of the following is an element of the TCP header that can indicate that a connection has been established?


A) Flags
B) Stream index
C) SEQ/ACK analysis
D) Sequence number

Correct Answer

verifed

verified

MATCHING -a set of characteristics that define a type of network activity


A) back door
B) MTU
C) ping sweep
D) scan throttling
E) packet injection
F) signature
G) vanilla scan
H) RPC
I) FIN packet
J) RST packet

Correct Answer

verifed

verified

Under which suspicious traffic signature category would a port scan fall?


A) informational
B) reconnaissance
C) denial of service
D) unauthorized access

Correct Answer

verifed

verified

Showing 21 - 40 of 49

Related Exams

Show Answer