Chapter 7

1. False A distributed denial of service (DDoS) attack comes from multiple computers.

2. A sniffing attack Attackers can use protocol analyzers (also called sniffers or packet sniffers) to capture and analyze network traffic in a sniffing attack.

3. LAND A LAND attack spoofs the source address in a TCP SYN packet. If not detected and stopped, it causes the system to repeatedly reply to itself.

4. C LDAP uses port 389, and secure LDAP uses port 636. SNMP uses ports 161 and 162. Terminal Services and Remote Desktop Services use port 3389. HTTP uses port 80, and HTTPS uses port 443.

5. True Hardware-based firewalls are more efficient than software-based firewalls.

6. D A perimeter network (also called a DMZ) provides a layer of ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.