Computer Networks Questions & Answers – Network Attacks

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Network Attacks”.

1. The attacker using a network of compromised devices is known as _____________
a) Internet
b) Botnet
c) Telnet
d) D-net
View Answer

Answer: b
Explanation: Botnet is a network of compromised devices used by the attacker without the owner’s knowledge to perform unethical activities such as spamming. The attacker usually uses the least secure devices to create the botnet.

2. Which of the following is a form of DoS attack?
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned
View Answer

Answer: d
Explanation: In a DoS attack, the attacker won’t let the victims access the network by using a certain method that ensures that an essential network resource is unavailable to the victim. In vulnerability attack, the attacker exploits any obvious vulnerable entity in the network to deny the victim access into the network. In bandwidth flooding, the attacker floods the victim with a huge flow of packets and uses up all the bandwidth. In connection flooding, the attacker floods the victim network with a huge number of connections, so that, no other machine can connect to it.

3. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
View Answer

Answer: c
Explanation: In Vulnerability attack, the attacker exploits the vulnerable control points of the network to deny access to the victims. In Bandwidth flooding, the attacker intentionally uses up all the bandwidth by flooding the victim with a deluge of packets and makes sure that the victim can’t use any bandwidth. In UDP flooding, too many UDP packets are sent by the attacker to the victim at random ports.
advertisement
advertisement

4. The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding
View Answer

Answer: b
Explanation: In Bandwidth flooding, the attacker floods the victim machine with a deluge of packets to make sure that no bandwidth is available. The victim then cannot utilize the complete bandwidth to perform its operation.

5. Packet sniffers involve ____________
a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
View Answer

Answer: b
Explanation: The function of packet sniffers is to just silently receive the packets flowing in the channel. If they inject any packets into the channel, they might alert the other users about the intrusion.

6. Sniffers can be prevented by using _______________
a) Wired environment
b) WiFi
c) Ethernet LAN
d) Switched network
View Answer

Answer: d
Explanation: Switches make sure that the packet is sent to the intended receiver and no one else, thus preventing Sniffers to perform their function. Intelligent switches are hence used preferably for the network.

7. Firewalls are often configured to block ___________
a) UDP traffic
b) TCP traffic
c) Sensitive traffic
d) Best-effort traffic
View Answer

Answer: a
Explanation: UDP is more vulnerable to attacks, so firewalls are often configured to block suspicious UDP traffic.
advertisement

8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
View Answer

Answer: b
Explanation: Since there is no other packet to be transmitted, there is no need for a queue. Therefore, the delay caused due to the queuing would be none i.e. 0.

Sanfoundry Global Education & Learning Series – Computer Networks.

advertisement

To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.