Module 9: Practice Quiz Flashcards

(24 cards)

1
Q

Which property of secure communication ensures that people are who they say they are when communicating over the internet?

A

Authentication

This property is crucial for verifying identities in digital communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which property of secure communication ensures that a message is not modified before it reaches the receiver?

A

Integrity

Integrity protects the accuracy and consistency of data during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which property of secure communication is protected by encrypting the messages exchanged?

A

Confidentiality

Confidentiality ensures that information is accessible only to those authorized to have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers tend to keep the uptime of domains used for malicious purposes as short as possible in order to avoid being detected.

T/F

A

FALSE

Attackers may keep domains active longer to exploit them before detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Round Robin DNS is a mechanism used by large websites to distribute the load of incoming requests to several servers at a single physical location.

T/F

A

TRUE

This method helps balance traffic and improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS-based content delivery aims to distribute the load amongst multiple servers at a single location, but also distribute these servers across the world.

T/F

A

TRUE

This approach enhances responsiveness and availability for users globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS-based content delivery determines the nearest server, which results in increased responsiveness and availability.

T/F

A

TRUE

Proximity to servers reduces latency and improves user experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Legitimate networks may let malicious content be up for weeks to more than a year.

T/F

A

FALSE

Legitimate networks typically act quickly to remove malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does FIRE identify the most malicious networks?

A

Analyzing the information given by data sources and searching for ASes with a large percentage of malicious IP addresses.

This method focuses on identifying patterns of malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ASwatch uses information exclusively from the data plane to infer network reputation.

T/F

A

FALSE

ASwatch also considers control plane data for a comprehensive analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ASwatch relies on the premise that ‘bulletproof’ ASes have distinct interconnection patterns and overall different control plane behavior from most legitimate networks.

T/F

A

TRUE

This distinction helps in identifying potentially malicious networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In order to stop a prefix or AS-Path announcement attack, we need access to the ——, such as IP prefixes and AS-paths.

A

Control Plane data

Control Plane data includes IP prefixes and AS-paths necessary for mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In attacks where network traffic is dropped, manipulated or impersonated, the data accessed is located at the ——–.

A

Data Plane

The Data Plane is responsible for the actual transmission of data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attack disrupts the BGP characteristic to favor more specific prefixes?

A

Sub-prefix hijacking

This attack can lead to routing issues and traffic misdirection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARTEMIS uses a configuration file and a mechanism for receiving BGP updates from routers and monitoring services to detect BGP hijacking attacks.

T/F

A

TRUE

This system enhances the detection of routing anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Distributed Denial of Service Attack consists of the attacker sending a large volume of traffic to the victim through servers (slaves), so that the victim host becomes unreachable or in exhaustion of its bandwidth.

T/F

A

TRUE

DDoS attacks aim to overwhelm the target’s resources.

17
Q

IP spoofing is the act of setting a false IP address in the source field of a packet with the purpose of impersonating a legitimate server.

T/F

18
Q

In a reflection attack, the attackers use a set of reflectors to initiate an attack on the victim.

T/F

A

TRUE

Reflectors amplify the attack traffic directed at the victim.

19
Q

During a Reflection and Amplification attack, the slaves set the source address of the packets to the ——–.

A

Victim’s IP address

This misdirection increases the attack’s effectiveness.

20
Q

What is the difference between a conventional DDoS and a Reflection and Amplification attack?

A

In a DDoS attack, the slaves send traffic directly to the victim as opposed to a reflector sending the traffic to the victim.

This distinction highlights the mechanics of each attack type.

21
Q

Which mitigation technique uses fine-grained filters across AS domain borders, and attributes such as length and fragment can be used to match traffic?

A

BGP Flowspec

BGP Flowspec allows for more precise traffic management.

22
Q

Which defense mechanism consists of a service that diverts the incoming traffic to a specialized server, where traffic is divided into either clean or unwanted traffic, and clean traffic is then sent to its original destination?

A

Traffic Scrubbing Services

This service enhances network security by filtering out malicious traffic.

23
Q

BGP Blackholing stops the traffic closer to the destination of the attack.

T/F

A

FALSE

BGP Blackholing is designed to stop traffic closer to the source of the attack.

24
Q

BGP Blackholing is used to mitigate DDoS attacks.

T/F

A

TRUE

This technique helps to prevent further damage during an attack.