Questão 1
Questão
Attacker’s sessions consume all resources—RAM, CPU, port numbers
Slows down or disables the target until it can’t serve legitimate requests
Responda
-
DoS Attacks
-
Anomaly
-
Exploit
Questão 2
Questão
Types of DoS attacks (Select 3)
Responda
-
TCP SYN flood
-
ICMP sweep
-
TCP port scan
-
TCP sweep
-
ICMP SYN flood
Questão 3
Questão
Attacker floods victim with incomplete TCP/IP connection requests
The victim’s connection table becomes full, so legitimate clients can’t connect
Responda
-
TCP SYN flodd
-
ICMP sweep
-
TCP port scan
Questão 4
Questão
Attackers eends ICMP traffic to find targets
Attacker then attacks hosts that reply
Responda
-
TCP SYN flood
-
ICMP Sweep
-
TCP port scan
Questão 5
Questão
Attacker probes a victim by sending TCP/IP connection requests to varying destination ports
Based on replies, attacker can map out which services are running on the victim system
Attacker then targets those destination ports to exploit the system
Responda
-
TCP SYN flood
-
ICMP sweep
-
TCP port scan
Questão 6
Questão
You can apply DoS protection to four protocols:
Responda
-
TCP
-
UDP
-
ICMP
-
SCTP
-
DST
-
SRC
-
SMTP
Questão 7
Questão
detects a high volume of that specific protocol, or signal in the protocol.
Responda
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Questão 8
Questão
detects probing attempts to map which of the host’s ports respond and, therefore, might be vulnerable.
Responda
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Questão 9
Questão
look for large volumes of traffic originating from a single IP.
Responda
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Questão 10
Questão
look for large volumes of traffic destined for a single IP.
Responda
-
Flood sensor
-
Sweep/Scan
-
Source Signatures
-
Destination signatures
Questão 11
Questão
Which of the following type of attack is a characteristic of a DoS attack?
Questão 12
Questão
Which DOS anomaly sensor can be used to detect and block a port scanner’s probing attempts?
Responda
-
A. tcp_syn_flood
-
B. tcp_port_scan
Questão 13
Questão
Web Application Firewall (WAF) is only available in proxy inspection mode
Questão 14
Questão 15
Questão
The variety of attacks based on _______ is limitless, but they commonly include transmitting private data like authentication cookies or other session information to the attacker.
Questão 16
Questão 17
Questão
WAF protocol constraints protect against what type of attacks?
Responda
-
A. Buffer overflow
-
B. ICMP Sweep
Questão 18
Questão
To use the WAF feature, which inspection mode should be used?
Questão 19
Questão
Which chipset uses NTurbo to accelerate IPS sessions?
Questão 20
Questão
Which of the following features requires full SSL inspection to maximize it’s detection capability?
Questão 21
Questão
If there are high-CPU use problems caused by the IPS, you can use the ____________ command with option 5 to isolate where the problem might be.
Questão 22
Questão
Which FQDN does FortiGate use to obtain IPS updates?
Responda
-
update.fortiguard.net
-
service.fortiguard.com
Questão 23
Questão
When IPS fail open is triggered, what is the expected behavior if the IPS fail open option is set to enabled?