Free II0-001 Exam Braindumps (page: 5)

Page 4 of 58

What is the difference between a zombie host and a reflector host?

  1. Unlike a zombie, a reflector is a laundering host that fundamentally transforms and/or delays the attacker's communications before they continue down the attack path. (Zombie technique)
  2. Unlike a zombie, a Traceback through the stepping stone host requires determining if two communications streams, viewed at different points in the network, have the same origin and are essentially the same stream. (stepping stone Traceback technique)
  3. Unlike a zombie host, the reflector is an uncompromised host that cooperates with the attack in an innocent manner consistent with its normal function.
  4. A zombie is a version of a reflector host.

Answer(s): C



The major disadvantage to techniques that attempt to mark IP packets as they move through the internet is:

  1. A decrease in network efficiency
  2. An increase in the packet load
  3. An increase in bandwidth consumption
  4. All of the above

Answer(s): C



In normal operation, a host receiving packets can determine their source by direct examination of the source address field in the:

  1. The IP packet header
  2. Source code
  3. Audit logs
  4. Intrusion Detection System

Answer(s): A



One caution an investigator should take when examining the source of a network attack is:

  1. an occurrence of Social Engineering
  2. relaxed physical security
  3. the source IP address may have been spoofed
  4. a sniffer could be on the network

Answer(s): C






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts