What is the purpose of a Denial of Service attack?
a. Exploit a weakness in the TCP/IP stack
b. To execute a Trojan on a system
c. To overload a system so it is no longer operational
d. To shutdown services by turning them off

1 Answer

Answer :

c. To overload a system so it is no longer operational

Related questions

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : .How many layers are present in the Internet protocol stack (TCP/IP model)? a. 5 b. 7 c. 6 d. 10

Last Answer : a. 5

Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application

Last Answer : b. Host to host

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack

Last Answer : c) Patent

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : The standard suit of protocols used by the Internet, Intranets, extranets andsome other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : An IP address is a: a) binary number that uniquely identifies computers. b) also identifies other devices on TCP/IP network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An IP address is a: a) binary number that uniquely identifies computers. b) also identifies other devices on TCP/IP network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork layer

Last Answer : B) Session Layer

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : TCP/IP ..................layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Write procedure to configure TCP/IP settings in a network.

Last Answer : Linux includes a network configuration tool that enables you to configure various network interfaces on your system for TCP/IP networking. You can run the network configuration tool to add a new network interface or ... , you may use IP addresses in the range 192.168.0.0 to 192.168.255.255

Description : A type of internet account, in which the computer is not connected directly to the net. (1) Shell Account (2) Kernel Account (3) Server Account (4) TCP/IP Account

Last Answer :  TCP/IP Account

Description : The technology that is used to establish wireless networking is (1) TCP/IP (2) J2ME (3) MATLAB (4) Bluetooth

Last Answer : Bluetooth

Description : Which among the following standard protocols is the most widely used by the Internet ? (1) HTTP (2) TCP/IP (3) SMTP (4) SLIP

Last Answer : TCP/IP

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network

Last Answer : Answer: Marks to all

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : The _______ is a unidirectional protocol that has no flow or error control. A. Simplest B. Simplex C. TCP/IP protocol D. Simplest or Simplex

Last Answer : D. Simplest or Simplex

Description : 3 The whole email server may be targeted for a complete interruption of services with these failure like A)Storage overload and bandwidth blocking

Last Answer : A)Storage overload and bandwidth blocking

Description : The whole email server may be targeted for a complete interruption of services with these failure like A)Storage overload and bandwidth blocking

Last Answer : A)Storage overload and bandwidth blocking

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor

Last Answer : A) TCP/IP

Description : The purpose of the reverse power relay, provided on a ship's service alternator panel, is to trip the circuit in the event of ______________. A. main circuit overload B. high power transfer C. generator overspeeding D. alternator motorization

Last Answer : Answer: D

Description : Give two reasons to explain as to why the Tropical Evergreen Forests are difficult to exploit for commercial purpose. -Geography

Last Answer : 1. They are very dense. Transport is not possible. 2. Ebony and Mahogany

Description : The main purpose of an electric space heater installed in a large AC generator is to _____________. A. keep the lube oil warm for quick starting B. prevent moisture from condensing in the ... is shutdown C. prevent the windings from becoming brittle D. prevent acidic pitting of the slip rings

Last Answer : Answer: B