Search Header Logo

Dos & DDOS attacks

Authored by Baba Shaheer

English

12th Grade

Used 2+ times

Dos & DDOS attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of using hping3 in internal pentesting?

To create a secure network connection

To generate flood attacks for testing network resilience

To encrypt data packets

To monitor network traffic

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of packets does a UDP flood attack primarily use?

TCP packets

ICMP packets

UDP packets

ARP packets

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the command `hping3 --flood --udp -p 80 192.168.1.10`, what does `-p 80` specify?

The target IP address

The target port number

The packet size

The protocol type

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the effect of the `--flood` option in the hping3 command?

It limits the packet sending rate

It sends packets as fast as possible

It encrypts the packets

It changes the packet type to ICMP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used in an ICMP flood attack?

TCP

UDP

ICMP

HTTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the common name for an ICMP flood attack?

SYN flood

Ping flood

ARP flood

DNS flood

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of hping3, what does the `--udp` option specify?

The use of TCP packets

The use of ICMP packets

The use of UDP packets

The use of ARP packets

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?