4-1. Operating systems are identified primarily by _____.4-2. Reading banners is an example of _____.4-3. DoS attacks aim at _____.4-4. In which of the following does the victim crash after receiving a single attack packet?4-5. SYN flooding is effective _____.4-6. Which of the following DoS attacks uses many zombies to attack the victim?4-7. Which of the following uses routers in which broadcasting has been left on?4-8. File infector viruses infect _____.Chapter 4 Reading Questions4-1. Operating systems are identified primarily by _____.a. fingerprintingb. host scanningc. port scanningd. protocol scanninge. ping scanning.4-2. Reading banners is an example of _____.a. active fingerprintingb. passive fingerprinting4-3. DoS attacks aim at _____.a. confidentialityb. integrityc. availabilityd. All of the above about equally.4-4. In which of the following does the victim crash after receiving a single attack packet?a. LANDb. Smurfc. Both of the above.d. Neither a. nor b.4-5. SYN flooding is effective _____.a. because of an asymmetry in the work that the sender and receiver must do.b. because the basic protocol is flawedc. because SYN messages are encapsulated and so cannot be traced back to the attackerd. because it is based on DDoS4-6. Which of the following DoS attacks uses many zombies to attack the victim?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above. Page 1 of 24-7. Which of the following uses routers in which broadcasting has been left on?a. SYN floodingb. DDoSc. Smurfd. LANDe. All of the above.4-8. File infector viruses infect _____.a. data filesb. boot sectorsc. Both of the above.d. Neither a. nor b. Page 2 of
View Full Document