Free II0-001 Exam Braindumps (page: 7)

Page 6 of 58

Tracebacks are difficult to perform in a Distributed Denial of Service attack because:

  1. by definition of the attack, the locality of the attacking slaves is dispersed
  2. in order to determine accountability, not only the slaves, but the masters, and finally the originating machine must be discovered
  3. the attack involves a multitude of attackers that do not necessarily share any attributes in common
  4. all of the above

Answer(s): D



A Distributed Denial of Service attack has just occurred using reflectors. What are the implications in terms of tracing the attack back?

  1. a successful Traceback to the slave is not possible as by definition, a reflector DDoS attack spoofs the connection between the slave and reflector
  2. a successful Traceback is possible as some form of reflector attacks require legitimate (non-spoofed) connections from the slave to the reflector, which would expose the slave to potentially immediate Traceback
  3. a successful Traceback to the reflector is possible and an examination of the reflector machine's logs will point to the attack master
  4. reflector machines replace slaves in the attack, further complicating any Traceback effort

Answer(s): B



What IP Traceback technique's basic idea is to have routers label a subset of transit packets with information about the router labeling router, thus enabling the receiver to reconstruct the path back to the source?

  1. SPIE
  2. ITRACE
  3. PPM
  4. Ingress Filtering

Answer(s): C



Which is true regarding tracing Secure Socket Layer (SSL) and Transport Layer Security (TLS) connections?

  1. TLS is more difficult to trace due to the encryption of the message source routing
  2. The connection source and destination can be traced in both cases because the message header is unencrypted.
  3. The connection recipient can be traced in both cases, but the source cannot.
  4. An SSL connection can be traced, even with encrypted content, where the TLS connection can not be traced due to header encryption.

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts