Question: Question 27 1 pts How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. c) DDOS attacks on DNS

Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected
Question 27 1 pts How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. c) DDOS attacks on DNS servers for specific hosts have redirected traffic to other hosts masquerading as the target of the attack a) Partially successful attacks on root DNS servers have had little effect on Internet traffic. c) DDOS attacks on root DNS servers have brought the whole internet to a standstill. d) Botnets may have been used in some DNS DDOS attacks. b) DDOS attacks on DNS servers for specific hosts have made it difficult for some users to reach those hosts. Question 13 Which of the following play an essential part in a smurf attack? Select all that apply. a) IP redirection b) Packet broadcasting c) An excessively large packet d) A forged IP source address D Question 42 1 pts We are implementing a server with off-line authentication. What is included in the security boundary? a) Everything from the point where the credential is entered to the checking mechanism and the authentication database Ob) The server itself, including its credential checking mechanism and the authentication database Oc) The server itself, plus a separate authentication server that validates the credential d) The server itself, which does not include an authentication database Question 26 1 pts How does DNS cache poisoning work? a) The attacker transmits bogus DNS queries to the victim, or the victim's DNS server, containing the bogus information b) The attacker transmits bogus DNS responses to the victim, or the victim's DNS server, containing the bogus information c) The attacker masquerades as a DNS server, intercepting all DNS queries from the victim and responding with bogus answers d) The attacker edits the HOSTS.TXT file on the victim's computer or DNS server to modify the DNS information Question 21 1 pts Which of the following are possible features of the DNS protocol? Select all that apply. b) Distributed database for retrieving domain name information c) Hierarchical domain name structure d) TCP is used to ensure reliable transmission of all transactions a) HOSTS.TXT file to keep a local list of domain names e) Recursive name resolution D Question 16 1 Which of the following are true of generic top-level domains .edu, .gov, and mil? Select all that apply. c) Domain registrars can only provide domain names for web servers, b) The registrar restricts domain names to owners in particular countries, industries, or organizations, d) The domain registrar ensures that the domain information is published in the Domain Name System a) A registrar is responsible for issuing names to domain name owners

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!