Which denial-of-service attack sends malformed ICMP packets to the target server?
A. PKI
B. DDoS
C. Ping flood
D. Ping of death
Answer: Ping of Death
Learn More :
Understanding and Maintaining Cloud Security
- Ciphers that perform symmetrical block encryption include which of the following?
- What security protocol uses multiple keys in a repetitive encryption process?
- Where are access control lists commonly configured? (Choose two.)
- What type of denial-of-service attack sends a large amount of Internet control packets to the target?
- Which two encryption protocols use a public and private key pair for encryption?
- User access control consists of which of the following? (Choose four.)
- What is a standardized set of roles, policies, and procedures used to create, manage, distribute, use, store, and revoke digital certificates and manage public/private key encryption?
- What security technique is configured on a storage controller to limit what storage volumes a server can access?
- Name three types of role-based access control.
- Hardening a server system can include which of the following? (Choose three.)
- What type of access control allows the users to assign rights to objects?
- What security protocol is used on web browsers for secure connection to an ecommerce site?
- Network scanning will determine which of the following? (Choose three.)
- What is the name of a security site that authenticates the identity of individuals, computers, and other entities in the network?
- What security technique is used in a storage area network to limit the storage systems a server can access?
- What is the process of complicating the ability to read stored data?
- What uses a number of zombies or bots to create a denial-of-service attack?
- Which security technique uses a list of permit and deny statements in a security device?
- A _______ is any method of encrypting data by concealing its readability and meaning.
- _______ is an encryption framework that uses a pair of cryptographic keys: one public key and one private key.
- _______ is the process of determining the identity of a client usually by a login process.
- LUN masking is configured on the _______ and controls access to logical storage units.
- Zoning is configured on the _______ network to limit storage access between the initiator and the target.
- A _______ is an attack that is launched over the Internet from many end stations all attacking a target at the same time.