Engineering Questions with Answers - Multiple Choice Questions

MCQs on Network Attacks

1 - Question

The attacker using a network of compromised devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net

View Answer

Answer: b
Explanation: Botnet is a network of compromised devices used by the attacker without the owner’s knowledge to perform unethical activities such as spamming. The attacker usually uses the least secure devices to create the botnet.




2 - Question

Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned

View Answer

Answer: d
Explanation: In a DoS attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. In vulnerability attack, the attacker exploits any obvious vulnerable entity in the network to deny the victim access into the network. In bandwidth flooding, the attacker floods the victim with a huge flow of packets and uses up all the bandwidth. In connection flooding, the attacker floods the victim network with a huge number of connections, so that, no other machine can connect to it.




3 - Question

The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding

View Answer
Answer: c
Explanation: In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.
 



4 - Question

The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding

View Answer

Answer: b
Explanation: In Bandwidth flooding, the attacker floods the victim machine with a deluge of packets to make sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation.




5 - Question

Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver

View Answer

Answer: b
Explanation: The function of packet sniffers is to just silently receive the packets flowing in the channel. If they inject any packets into the channel, they might alert the other users about the intrusion.




6 - Question

Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
d) Switched network

View Answer

Answer: d
Explanation: Switches make sure that the packet is sent to the intended receiver and no one else, thus preventing Sniffers to perform their function. Intelligent switches are hence used preferably for the network.




7 - Question

Firewalls are often configured to block ___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic

View Answer

Answer: a
Explanation: UDP is more vulnerable to attacks, so firewalls are often configured to block suspicious UDP traffic.




8 - Question

In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay

View Answer

Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need for a queue. Therefore, the delay caused due to the queuing would be none i.e. 0.

Get weekly updates about new MCQs and other posts by joining 18000+ community of active learners