

TCP SYN Flood Attacks Video
Interactive Video
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Hard
Sandy Thomaschek
FREE Resource
7 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What spoofed IP address did the client use?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In this attack, what type of packet(s) does the DMZ server keep responding with?
SYN
ACK
SYN
ACK
FIN
ACK
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the threshold that was set on the ASA being used to monitor?
SYN requests
ACKnowledgements
FIN requests
RST requests
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the threshold set to on the ASA?
3
5
7
9
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If the ASA determines the TCP session is valid, what does it do?
3-way handshake with the DMZ server
Removes the threshold
Changes the control bit to FIN to terminate the session
Updates the control bit to ACK to continue the session
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DMZ server? Choose 2 and use Google if necessary.
does not allow access to a company's private network
server on a private network that can be accessed by people on an untrusted network (the internet)
server located in government entities that can't be accessed via the internet
allows access to a company's private network
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What is a Cisco ASA? Choose 2, use Google if necessary.
security device that combines firewall, antivirus, intrusion prevention and VPN capabilities
Adapative Security Appliance
Assurance Security Application
a hypervisor that runs on top of a DMZ servers operating system
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?