Frage 1
Frage
Attacker’s sessions consume all resources—RAM, CPU, port numbers
Slows down or disables the target until it can’t serve legitimate requests
Antworten
-
DoS Attacks
-
Anomaly
-
Exploit
Frage 2
Frage
Types of DoS attacks (Select 3)
Antworten
-
TCP SYN flood
-
ICMP sweep
-
TCP port scan
-
TCP sweep
-
ICMP SYN flood
Frage 3
Frage
Attacker floods victim with incomplete TCP/IP connection requests
The victim’s connection table becomes full, so legitimate clients can’t connect
Antworten
-
TCP SYN flodd
-
ICMP sweep
-
TCP port scan
Frage 4
Frage
Attackers eends ICMP traffic to find targets
Attacker then attacks hosts that reply
Antworten
-
TCP SYN flood
-
ICMP Sweep
-
TCP port scan
Frage 5
Frage
Attacker probes a victim by sending TCP/IP connection requests to varying destination ports
Based on replies, attacker can map out which services are running on the victim system
Attacker then targets those destination ports to exploit the system
Antworten
-
TCP SYN flood
-
ICMP sweep
-
TCP port scan
Frage 6
Frage
You can apply DoS protection to four protocols:
Antworten
-
TCP
-
UDP
-
ICMP
-
SCTP
-
DST
-
SRC
-
SMTP
Frage 7
Frage
detects a high volume of that specific protocol, or signal in the protocol.
Antworten
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Frage 8
Frage
detects probing attempts to map which of the host’s ports respond and, therefore, might be vulnerable.
Antworten
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Frage 9
Frage
look for large volumes of traffic originating from a single IP.
Antworten
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Frage 10
Frage
look for large volumes of traffic destined for a single IP.
Antworten
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Frage 11
Frage
Which of the following type of attack is a characteristic of a DoS attack?
Frage 12
Frage
Which DOS anomaly sensor can be used to detect and block a port scanner’s probing attempts?
Antworten
-
A. tcp_syn_flood
-
B. tcp_port_scan
Frage 13
Frage
Web Application Firewall (WAF) is only available in proxy inspection mode
Frage 14
Frage 15
Frage
The variety of attacks based on _______ is limitless, but they commonly include transmitting private data like authentication cookies or other session information to the attacker.
Frage 16
Frage 17
Frage
WAF protocol constraints protect against what type of attacks?
Antworten
-
A. Buffer overflow
-
B. ICMP Sweep
Frage 18
Frage
To use the WAF feature, which inspection mode should be used?
Frage 19
Frage
Which chipset uses NTurbo to accelerate IPS sessions?
Frage 20
Frage
Which of the following features requires full SSL inspection to maximize it’s detection capability?
Frage 21
Frage
If there are high-CPU use problems caused by the IPS, you can use the ____________ command with option 5 to isolate where the problem might be.
Frage 22
Frage
Which FQDN does FortiGate use to obtain IPS updates?
Antworten
-
update.fortiguard.net
-
service.fortiguard.com
Frage 23
Frage
When IPS fail open is triggered, what is the expected behavior if the IPS fail open option is set to enabled?