Service overloading occurs when floods of network requests are made to a server daemon on a single computer. It cannot process regular tasks in a timely manner.
Message flooding occurs when a user slows down the processing of a system on the network, to prevent the system from processing its normal workload, by “flooding” the machine with network messages addressed to it. The system spends most of its time responding to these messages.
Connection clogging occurs when users make connection requests with forged source addresses that specify nonexistent or unreachable hosts that cannot be contacted. Thus, there is no way to trace the connection back; they remain until they time out or reset. The goal is to use up the limit of partially open connections.
29. Smurf is an example of which of the following?
a. IP address spoofing attack
b. Denial-of-service attack
c. Redirect attack
d. TCP sequence number attack
Internet Protocol (IP) address spoofing attack and transmission control protocol (TCP) sequence number attack are examples of session hijacking attacks. The IP address spoofing is falsifying the identity of a computer system. In a redirect attack, a hacker redirects the TCP stream through the hacker’s computer. The TCP sequence number attack is a prediction of the sequence number needed to carry out an unauthorized handshake.
30. The demand for reliable computing is increasing. Reliable computing has which of the following desired elements in computer systems?
a. Data integrity and availability
b. Data security and privacy
c. Confidentiality and modularity
d. Portability and feasibility
Data security, privacy, and confidentiality are incorrect because they deal with ensuring that data is disclosed only to authorized individuals and have nothing to do with reliable computing. Modularity deals with the breaking down of a large system into small modules. Portability deals with the ability of application software source code and data to be transported without significant modification to more than one type of computer platform or more than one type of operating system. Portability has nothing to do with reliable computing. Feasibility deals with the degree to which the requirements can be implemented under existing constraints.
31. Which of the following is
a. Help desk
b. Assistance group
c. Forensics services
d. Simulated events
32. Software flaw remediation is
a. Configuration management process
b. Security assessments
c. Continuous monitoring
d. Incident response activities