TCP SYN Flood Attacks Video

TCP SYN Flood Attacks Video

Assessment

Interactive Video

Information Technology (IT)

12th Grade

Hard

Created by

Sandy Thomaschek

FREE Resource

7 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What spoofed IP address did the client use?

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In this attack, what type of packet(s) does the DMZ server keep responding with?

SYN

ACK

SYN

ACK

FIN

ACK

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the threshold that was set on the ASA being used to monitor?

SYN requests

ACKnowledgements

FIN requests

RST requests

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the threshold set to on the ASA?

3

5

7

9

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the ASA determines the TCP session is valid, what does it do?

3-way handshake with the DMZ server

Removes the threshold

Changes the control bit to FIN to terminate the session

Updates the control bit to ACK to continue the session

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DMZ server? Choose 2 and use Google if necessary.

does not allow access to a company's private network

server on a private network that can be accessed by people on an untrusted network (the internet)

server located in government entities that can't be accessed via the internet

allows access to a company's private network

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a Cisco ASA? Choose 2, use Google if necessary.

security device that combines firewall, antivirus, intrusion prevention and VPN capabilities

Adapative Security Appliance

Assurance Security Application

a hypervisor that runs on top of a DMZ servers operating system