How do you protect your network against SYN Flood attacks?
The SYN flood attack sends TCP connections requests faster than a machine can process them.
Attacker creates a random source address for each packet
SYN flag set in each packet is a request to open a new connection to the server from the
spoofed IP address
Victim responds to spoofed IP address,then waits for confirmation that never arrives (timeout
wait is about 3 minutes)
Victim’s connection table fills up waiting for replies and ignores new connections
Legitimate users are ignored and will not be able to access the server
How do you protect your network against SYN Flood attacks?
What type of port scan is shown below?
What should Stephanie use so that she does not get in trouble for surfing the Internet?
Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday,
she went to a mandatory security awareness class (Security5) put on by her company’s IT
department. During the class, the IT department informed all employees that everyone’s Internet
activity was thenceforth going to be monitored.
Stephanie is worried that her Internet activity might give her supervisor reason to write her up, or
worse get her fired. Stephanie’s daily work duties only consume about four hours of her time, so
she usually spends the rest of the day surfing the web. Stephanie really enjoys surfing the Internet
but definitely does not want to get fired for it.
What should Stephanie use so that she does not get in trouble for surfing the Internet?
What type of port will Neil need to setup in order to accomplish this?
Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his
network that will receive a copy of every packet that passes through the main office switch. What
type of port will Neil need to setup in order to accomplish this?
What is Jason trying to accomplish here?
In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR. These
flags have decimal numbers assigned to them:
FIN = 1
SYN = 2
RST = 4
PSH = 8
ACK = 16
URG = 32
ECE = 64
CWR = 128
Jason is the security administrator of ASPEN Communications. He analyzes some traffic using
Wireshark and has enabled the following filters.
What is Jason trying to accomplish here?
How can she accomplish this?
Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all
the Cisco switches in the network. How can she accomplish this?
Here is the output of the SIDs: From the above list identify the user account with System Administrator pr
What is the problem with this ASP script (login.asp)?
How would you prevent Google from storing your search keywords?
Google uses a unique cookie for each browser used by an individual user on a computer. This
cookie contains information that allows Google to identify records about that user on its database.
This cookie is submitted every time a user launches a Google search, visits a site using AdSense
etc. The information stored in Google’s database, identified by the cookie, includes
Everything you search for using Google
Every web page you visit that has Google Adsense ads
How would you prevent Google from storing your search keywords?
How many bits encryption does SHA-1 use?
How many bits encryption does SHA-1 use?