Attacker’s sessions consume all resources—RAM, CPU, port numbers
Slows down or disables the target until it can’t serve legitimate requests
DoS Attacks
Anomaly
Exploit
Types of DoS attacks (Select 3)
TCP SYN flood
ICMP sweep
TCP port scan
TCP sweep
ICMP SYN flood
Attacker floods victim with incomplete TCP/IP connection requests The victim’s connection table becomes full, so legitimate clients can’t connect
TCP SYN flodd
Attackers eends ICMP traffic to find targets Attacker then attacks hosts that reply
ICMP Sweep
Attacker probes a victim by sending TCP/IP connection requests to varying destination ports Based on replies, attacker can map out which services are running on the victim system Attacker then targets those destination ports to exploit the system
You can apply DoS protection to four protocols:
TCP
UDP
ICMP
SCTP
DST
SRC
SMTP
detects a high volume of that specific protocol, or signal in the protocol.
Flood sensor
Sweep/Scan
Source Signatures
Destination signatures
detects probing attempts to map which of the host’s ports respond and, therefore, might be vulnerable.
look for large volumes of traffic originating from a single IP.
look for large volumes of traffic destined for a single IP.
Which of the following type of attack is a characteristic of a DoS attack?
A. Attempts to exploit a known application vulnerability
B. Attempts to overload a server with TCP SYN packets
Which DOS anomaly sensor can be used to detect and block a port scanner’s probing attempts?
A. tcp_syn_flood
B. tcp_port_scan
Web Application Firewall (WAF) is only available in proxy inspection mode
?
Example of a Web Attack-Cross-Site Scripting
Example of a Web Attack—SQL Injection
The variety of attacks based on _______ is limitless, but they commonly include transmitting private data like authentication cookies or other session information to the attacker.
cross-site scripting (XSS)
SQL injection
Example of a Web Attack XSS
WAF protocol constraints protect against what type of attacks?
A. Buffer overflow
B. ICMP Sweep
To use the WAF feature, which inspection mode should be used?
A. Flow
B. Proxy
Which chipset uses NTurbo to accelerate IPS sessions?
A. CP9
B. SoC3
Which of the following features requires full SSL inspection to maximize it’s detection capability?
A. WAF
B. DoS
If there are high-CPU use problems caused by the IPS, you can use the ____________ command with option 5 to isolate where the problem might be.
diagnose test application ipsmonitor
diagnose test ipsmonitor
diagnose application ipsmonitor
Which FQDN does FortiGate use to obtain IPS updates?
update.fortiguard.net
service.fortiguard.com
When IPS fail open is triggered, what is the expected behavior if the IPS fail open option is set to enabled?
New packets will pass through
New packets will be dropped