Itt320 Quiz (Question)
Itt320 Quiz (Question)
1. A person who uses scripts and programs written by others to perform his intrusion is
labelled as _________.
A. cracker
B. hacker
C. phreak
D. script kiddie
2. Which of the following does not reflex what a WHITE HAT hacker is?
A. A person who enjoys exploring the details of programmable systems and how to
stretch their capabilities.
B. A person who programs enthusiastically and is good at programming quickly.
C. A person who enjoys the intellectual challenge of creatively overcoming or
circumventing limitations.
D. A person who enjoys discovering vulnerabilities and directly posts them for full
disclosures.
3. The term __________refers to a person who has a keen interest in telephones and
telephones systems.
A. Script kiddies
B. Hacker
C. Cracker
D. Phreaks
A. Authentication
B. Firewalls
C. Password protection
D. Auditing
5. Rose just installed a new search engine on her laptop. Now whenever she searches the
Internet, she gets several pop‐up windows directing her to websites to buy products.
What does Rose have?
A. Phishing
B. Spyware
C. Adware
D. Trojan horse
• While the victim server is waiting, attacker will send another spoofed
syn packet continuously.
A. UDP flood
B. ICMP flood
C. SYN flood
D. Smurf Attack
7. The ____________ flag contains a carefully constructed cookie, generated a hash that
contains the IP address, port number, and other information from the client machine
requesting the connection. (three-way handshake process).
A. ACK
B. SYN-ACK
C. SYN
D. ACK-SYN
8. The only real safeguard against Ping of Death is to ensure that all ___________ and
_________ are routinely patched. This attack relies on vulnerabilities in the way a
particular operating systems or application handles abnormally large TCP packets.
9. What is the name for the Denial of Service (DoS) attack that Utilizes the ICMP, which in
the early stage it will sent the package to everyone in the network, and when they want
to reply back they will eventually be sent it to a fake destination (the victim IP address)?
A. SYN flood
B. Smurf attack
C. Ping of death
D. Distributed Denial of Service
10. ___________ seek to avoid SYN floods by changing the way the server allocates
memory for any given connection request. Instead of allocating a complete connection
object, the server is altered so that it only allocates a small-record.
A. SYN Cookies
B. Micro Blocks
C. SYN Blocks
D. RST Blocks
11. What are the rules that can be used in setting-up the “screening” firewalls?
12. Why is a Stateful Inspection (SPI) firewall more resistant to flooding attacks?
A. It automatically blocks large traffic from a single IP
B. It requires user authentication
C. It examines each packet in the context of previous packets
D. It examines each packet in the context of next packets
13. State what are the similarities of the characteristics between Application Gateway
firewall and Circuit Level Gateway firewall?
A. Both implement virtual circuit as the proxy
B. Both requires user authentication
C. Both firewalls are a cheap solution to setup
D. Both firewalls enable administrators to specify what applications to be allowed to
run in the network
• Mostly, it uses only a simple packet filtering approach and it is very easy
to configure.
A. Network host-based
B. Router-based
C. Single home
D. Dual home
15. A Device that can hide the the internal IP addresses is known as _________ .
A. Screened host
B. Bastion firewall
C. Proxy server
D. Proxy router
1 A 6 C 11 A
2 A 7 C 12 C
3 D 8 D 13 B
4 A 9 B 14 B
5 C 10 B 15 B
QUESTION 1
(2 marks)
Answer:
State what is the Difference between the first perspective and second perspective.
(3 marks)
Answer:
-Fosters a laissez-faire attitude toward security but second perspective take this as a
crucial situation
-security measures are not put in place until after a breach has occurred but second
perspective already prepared security
-this approach must be avoided at all costs and second perspective is the only one
that we need to approach.
QUESTION 2
Denial of service attack is a most common type of attack, because it is easy to execute.
Even a surveillance with minimal skill also able to perform it. As a network administrator
a) State TWO (2) ways that we can do to protect against Smurf Attack.
(3 marks)
Answer:
b) Discuss why Stateful Packet Inspection (SPI) firewall is one of the easiest ways to
stop a SYN flood attack.
(2 marks)
Answer:
Because it aware of context of packets and makes them less susceptible to flood
attacks since it knows if packet is part of a larger stream and SPI can recognizes
whether source IP is within the firewall
QUESTION 3
(3 marks)
Answer:
b) As the technology advance, the new specification of firewall emerges to support with
the latest needs in the network field. Briefly discuss what is a Hybrid firewall and how
it is operating.
(2 marks)
Answer:
Hybrid firewalls are the combined of others firewall such as stateful packet inspection
(SPI) combined with circuit level gateways. They work together by combining their
abilities to become a more powerful firewall.