Module 3 challenge
Assignment details
Due
August 8, 11:59 PM CST
Submitted
August 1, 8:06 PM CST
Attempts
2 left (3 attempts every 23 hours)
Your grade
To pass you need at least 80%. We keep your highest score.
Ready to review what you’ve learned before starting the assignment? I’m here to help.
August 8, 11:59 PM CSTAug 8, 11:59 PM CST
August 1, 8:06 PM CSTAug 1, 8:06 PM CST
2 left (3 attempts every 23 hours)
To pass you need at least 80%. We keep your highest score.
Graded Assignment • 50 min
What is the main objective of a Denial of Service (DoS) attack?
Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.
A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?
Fill in the blank: The DoS attack _____ occurs when an attacker repeatedly sends ICMP packets to a network server.
Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
As a security professional, you implement safeguards against attackers changing the source IP of a data packet in order to communicate over your company’s network. What type of network attack are you trying to avoid?
Fill in the blank: _____ is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.
In which attack would a malicious actor place themselves in the middle of an authorized connection and intercept the data in transit?
Fill in the blank: The _____ network attack occurs when a malicious actor takes a network transmission that was sent by an authorized user and repeats it at a later time to impersonate that user.
Which combination of DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?