SlideShare a Scribd company logo
Answer each of the questions below with a few sentences. Be brief, but fully explain your
answer.
1. Explain what is an IPSweep and a PortSweep type of attack?
2. In a few words, explain what are buffer overflow attacks?
3. Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS)
network attacks.
4. Briefly describe what are routing attacks. Provide two examples, highlighting their main
characteristics.
5. What countermeasures would you recommend to defend against these types of attacks?
Solution
1. IPsweep: The function ipswep attack is used to determine how many devices are connected to
the network and check what services these devices are running.
portsweep: The portsweep supports many ports to know which services provided to a single host.
The port is not opened until it supports three way hand shake.
2. it is discovered in hacking circles. This is not risky application even the iput strength is not
good. it must access by the administrator and the output comes from the way the input is
implemented.
3. Denial of services attack : it is a one of the cyber attack. In this the hackers doesn't enter into
your website it just unavailable your site to the user and make your website as a malcious
website. There by it take down the security firewall.
Distributed Denial of services attack: It mainly focuses on the multiple devices it is same as the
Denial of service attack.
4. Routing attack is one of the main problem in security breach because the router sends the data
in the form of packets so attackers mistreat those packets means they change the data or
information and sends. and the hackers sends the malcious packets to the router there by the
router gets affected and they can easily breachg into the router.
Ex: Consider an organizatiopn using a router the data that is sent by router in the form of
packets and these packets data when ever hacked by the hackers due to less security they change
the packet data and sends back there by wrong information is registered so the adminstrator has
to provide some security and authentication to the router.
5. To work against the hackers we must take active measures to defend against these attacks, The
information that is sent by the attackers or hackers must not be opened in our systems so that we
have to take care of not opening those keep secured with highly authentication and the password
should not be in common way it has to be difficult so they cannot expect to be so. Avoid over
writing the addresses.Be activity at time when suddenly if any thing wrong happens we must be
in a position to handle and manage the problem because it causes more damage when time runs.

More Related Content

PPTX
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
PDF
Enhancing the impregnability of linux servers
PDF
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
PPTX
Common Types of Cyber Attacks & How to Prevent Them.pptx
PPTX
IP spoofing .pptx
PPT
Network sec 1
PPTX
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
DOCX
write a review about wired Network Security -Network vulnerabilities -.docx
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
Enhancing the impregnability of linux servers
ENHANCING THE IMPREGNABILITY OF LINUX SERVERS
Common Types of Cyber Attacks & How to Prevent Them.pptx
IP spoofing .pptx
Network sec 1
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
write a review about wired Network Security -Network vulnerabilities -.docx

Similar to Answer each of the questions below with a few sentences. Be brief, b.pdf (20)

PDF
Top 50 Cybersecurity Interview Questions-2.pdf
PDF
Network security chapter 1,2
PDF
Attackers May Depend On Social Engineering To Gain...
PPTX
Unit5-week2_ cryptography attacksss.pptx
PDF
1 ijaems sept-2015-3-different attacks in the network a review
PPTX
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
PPT
Ne Course Part Two
PPSX
Ransomware 101
PPTX
Security Operation Center Fundamental
PDF
NIS Unit-1(PPT)jbdjjdcbjbchdhbchbjch.pdf
DOCX
Running head Cryptography1Cryptography16.docx
PDF
Network Security & Attacks
PPTX
Network sniffers & injection tools
PDF
04-post-connection-attacks.pdf
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PDF
Cit877[1]
PDF
Recognizing security threats
PPTX
Unmasking Vulnerabilities_ The Power of Network Pentesting.pptx
PDF
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
PDF
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
Top 50 Cybersecurity Interview Questions-2.pdf
Network security chapter 1,2
Attackers May Depend On Social Engineering To Gain...
Unit5-week2_ cryptography attacksss.pptx
1 ijaems sept-2015-3-different attacks in the network a review
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
Ne Course Part Two
Ransomware 101
Security Operation Center Fundamental
NIS Unit-1(PPT)jbdjjdcbjbchdhbchbjch.pdf
Running head Cryptography1Cryptography16.docx
Network Security & Attacks
Network sniffers & injection tools
04-post-connection-attacks.pdf
LIFT OFF 2017: Ransomware and IR Overview
Cit877[1]
Recognizing security threats
Unmasking Vulnerabilities_ The Power of Network Pentesting.pptx
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
Ad

More from shalini518936 (20)

PDF
Answer the followingHow would you find the normal approximation t.pdf
PDF
answer the following questions in brief paragraph form 1 what is GAA.pdf
PDF
Answer the following question in complete sentences. Minimum 1 page .pdf
PDF
Answer the following 4 questions clearly1- What constitutes the i.pdf
PDF
Answer Question to receive full points Luke is an owner of four socc.pdf
PDF
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdf
PDF
Answer in your own words, no copy and paste for the following three .pdf
PDF
Another term used for solar panels isQuestion 3 optionsphotovol.pdf
PDF
Answer $570.Please explain how to get this answer and show the wo.pdf
PDF
Answer All this question listed on this image file..Note do not c.pdf
PDF
ANOVA can be used only if the number of observations per group is eq.pdf
PDF
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
PDF
Analyze the role of diversification in creating value for Google..pdf
PDF
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
PDF
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
PDF
and need help calc the taxes as well as the taxable income An and Ca.pdf
PDF
Ande is a multi-tasker. She listens to music, works on papers, and c.pdf
PDF
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
PDF
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdf
PDF
An urn contains three red and two white balls. A ball is drawn and t.pdf
Answer the followingHow would you find the normal approximation t.pdf
answer the following questions in brief paragraph form 1 what is GAA.pdf
Answer the following question in complete sentences. Minimum 1 page .pdf
Answer the following 4 questions clearly1- What constitutes the i.pdf
Answer Question to receive full points Luke is an owner of four socc.pdf
Answer just part (b) please 1. The Monetary Process a. Using the cas.pdf
Answer in your own words, no copy and paste for the following three .pdf
Another term used for solar panels isQuestion 3 optionsphotovol.pdf
Answer $570.Please explain how to get this answer and show the wo.pdf
Answer All this question listed on this image file..Note do not c.pdf
ANOVA can be used only if the number of observations per group is eq.pdf
Annual Growth Rates of Real GDP Per Capita(in percents)Ending .pdf
Analyze the role of diversification in creating value for Google..pdf
Angle A is an acute angle and sin(A) = 1114. What is the value of c.pdf
Anderson, Inc. has owned 70 of its subsidiary, Arthur Corp., for se.pdf
and need help calc the taxes as well as the taxable income An and Ca.pdf
Ande is a multi-tasker. She listens to music, works on papers, and c.pdf
ANCIENT EGYPTIAN, Sometimes during the Ptolemic period, royal cartou.pdf
Ancient art of Egiptian Tradition3. Figures were positioned differ.pdf
An urn contains three red and two white balls. A ball is drawn and t.pdf
Ad

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
advance database management system book.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Trump Administration's workforce development strategy
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
Empowerment Technology for Senior High School Guide
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
IGGE1 Understanding the Self1234567891011
Unit 4 Computer Architecture Multicore Processor.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
History, Philosophy and sociology of education (1).pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
advance database management system book.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Trump Administration's workforce development strategy
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx

Answer each of the questions below with a few sentences. Be brief, b.pdf

  • 1. Answer each of the questions below with a few sentences. Be brief, but fully explain your answer. 1. Explain what is an IPSweep and a PortSweep type of attack? 2. In a few words, explain what are buffer overflow attacks? 3. Describe and explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) network attacks. 4. Briefly describe what are routing attacks. Provide two examples, highlighting their main characteristics. 5. What countermeasures would you recommend to defend against these types of attacks? Solution 1. IPsweep: The function ipswep attack is used to determine how many devices are connected to the network and check what services these devices are running. portsweep: The portsweep supports many ports to know which services provided to a single host. The port is not opened until it supports three way hand shake. 2. it is discovered in hacking circles. This is not risky application even the iput strength is not good. it must access by the administrator and the output comes from the way the input is implemented. 3. Denial of services attack : it is a one of the cyber attack. In this the hackers doesn't enter into your website it just unavailable your site to the user and make your website as a malcious website. There by it take down the security firewall. Distributed Denial of services attack: It mainly focuses on the multiple devices it is same as the Denial of service attack. 4. Routing attack is one of the main problem in security breach because the router sends the data in the form of packets so attackers mistreat those packets means they change the data or information and sends. and the hackers sends the malcious packets to the router there by the router gets affected and they can easily breachg into the router. Ex: Consider an organizatiopn using a router the data that is sent by router in the form of packets and these packets data when ever hacked by the hackers due to less security they change the packet data and sends back there by wrong information is registered so the adminstrator has to provide some security and authentication to the router. 5. To work against the hackers we must take active measures to defend against these attacks, The information that is sent by the attackers or hackers must not be opened in our systems so that we have to take care of not opening those keep secured with highly authentication and the password
  • 2. should not be in common way it has to be difficult so they cannot expect to be so. Avoid over writing the addresses.Be activity at time when suddenly if any thing wrong happens we must be in a position to handle and manage the problem because it causes more damage when time runs.