CS 6262- Network Security Questions
with 100% Correct Verified Answers
Types of amplification attacks. - ANSWER DoS bug and DOS flood. Denial of service
bug and denial of service flood
DoS bug - ANSWER DoS attack designed to exploit a bug say a design flaw or
vulnerability, an implementation error on the server. The attacker machine can send
a few packets that contain input that would trigger the bug and then crash the server
rendering it unavailable
NTP (Network Time Protocol) - ANSWER An UDP based Internet protocol that enables
synchronization of computer clock times in a network of computers by exchanging time
signals. (UDP 123)
Why is NTP vulnerable to amplification attacks? - ANSWER
Internet Protocol (IP) - ANSWER The network protocol that deals with the routing of
packets through interconnected networks to the final destination. A communication
standard that enables computers to route communications traffic from one network to
another as needed. It is connectionless, unreliable and best effort based. Each packet
, will find it's way to destination and there is no mechanism to ensure that all packets
will arrive properly and in sequence
IP Header - ANSWER The header defined by the IP. Used to create IP packets by
encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP
header. Most have a length of 20 bytes, but can be longer if options are applied.
From the security point of
view the main weakness of IP is that there is no authentication
of the source IP address. Which means that the attacker can
spoof an IP source address.
TCP (Transmission Control Protocol) - ANSWER Key characteristics are: Session
based, Congestion control and in-order delivery. TCP is tightly linked with IP and
usually seen as TCP/IP in writing. A connection-oriented, guaranteed-delivery protocol
used to send data packets between computers over a network like the Internet.
provides reliable, ordered, and error-checked delivery of a stream of packets on the
internet. Works at both ends of most Internet communication to ensure a perfect copy of
a message is sent.
TCP Handshake - ANSWER syn + syn/ack + ack. Suppose our client wants to connect to
a server. It first sends a SYN packet, this packet has a SYN flag set and also a sequence
number. The acknowledgement number is 0 because this is the first packet. The server
responds with a SYN/ACK packet, which means that both the SYN flap and
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.