hello quizlet
Home
Subjects
Expert solutions
Log in
Sign up
Sec4Programmers Ch7 w/o Fill ins
Flashcards
Learn
Test
Match
1. ______ relates to the capacity of the network links connecting a server to the wider Internet.
A. Application resource
B. Network bandwidth
C. System payload
D. Directed broadcast
Click the card to flip 👆
B
Click the card to flip 👆
1 / 15
Flashcards
Learn
Test
Match
Created by
David_DFD
Terms in this set (15)
1. ______ relates to the capacity of the network links connecting a server to the wider Internet.
A. Application resource
B. Network bandwidth
C. System payload
D. Directed broadcast
B
2. A ______ triggers a bug in the system's network handling software causing it to crash and the system can no longer communicate over the network until this software is reloaded.
A. echo
B. reflection
C. poison packet
D. flash flood
C
3. Using forged source addresses is known as _________.
A. source address spoofing
B. a three-way address
C. random dropping
D. directed broadcast
A
4. The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.
A. DNS amplification attack
B. SYN spoofing attack
C. basic flooding attack
D. poison packet attack
B
5. TCP uses the _______ to establish a connection.
A. zombie
B. SYN cookie
C. directed broadcast
D. three-way handshake
D
6. _______ bandwidth attacks attempt to take advantage of the disproportionally large resource consumption at a server.
A. Application-based
B. System-based
C. Random
D. Amplification
A
7. _______ is a text-based protocol with a syntax similar to that of HTTP.
A. RIP
B. DIP
C. SIP
D. HIP
C
8. Bots starting from a given HTTP link and then following all links on the provided Web site in a recursive way is called _______.
A. trailing
B. spidering
C. spoofing
D. crowding
B
9. ______ attempts to monopolize all of the available request handling threads on the Web server by sending HTTP requests that never complete.
A. HTTP
B. Reflection attacks
C. SYN flooding
D. Slowloris
D
10. A characteristic of reflection attacks is the lack of _______ traffic.
A. backscatter
B. network
C. three-way
D. botnet
A