2.13. Answers to Review Questions

  1. A. A DoS attack is intended to prevent access to network resources by overwhelming or flooding a service or network.

  2. B. A DDoS attack uses multiple computer systems to attack a server or host in the network.

  3. C. In a back door attack, a program or service is placed on a server to bypass normal security procedures.

  4. A. A man-in-the-middle attack attempts to fool both ends of a communications session into believing the system in the middle is the other end.

  5. C. A replay attack attempts to replay the results of a previously successful session to gain access.

  6. D. TCP/IP hijacking is an attempt to steal a valid IP address and use it to gain authorization or information from a network.

  7. A. A TCP ACK attack creates multiple incomplete ...

Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.