02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

282 Chapter 11 ■ Denial of Service<br />

15. What command-line utility can you use to craft custom packets with specific flags set?<br />

A. nmap<br />

B. Zenmap<br />

C. Ping<br />

D. hping3<br />

16. What protocol is used to carry out a fraggle attack?<br />

A. IPX<br />

B. TCP<br />

C. UDP<br />

D. ICMP<br />

17. What is the key difference between a smurf and a fraggle attack?<br />

A. TCP vs. UDP<br />

B. TCP vs. ICP<br />

C. UDP vs. ICMP<br />

D. TCP vs. ICMP<br />

18. What is the main difference between DoS and DDoS?<br />

A. Scale of attack<br />

B. Number of attackers<br />

C. Goal of the attack<br />

D. Protocols in use<br />

19. What is the most common sign of a DoS attack?<br />

A. Weird messages<br />

B. Rebooting of a system<br />

C. Slow performance<br />

D. Stolen credentials<br />

20. What response is missing in a SYN flood attack?<br />

A. ACK<br />

B. SYN<br />

C. SYN-ACK<br />

D. URG

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!