Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 4, Page 153 Prof. Michael P. Harris ITSY 2430 Intrusion Detection Name: __________________ Chapter Review Questions, Chapter Quiz 04 Date: ________ Network Traffic Signatures 1. Security devices on a network process digital information, such as text files and Web pages, the same way. However, which of the following information might they handle differently? 2. In which of the following can CVE improve the coordination of intrusion information on a network? (Choose all that apply) 3. Which of the following can be included in a network traffic signature? (Choose all that apply.) 4. What is the name of an error-checking procedure that uses a formula to calculate a numeric value? 5. How do attackers use fragmentation to circumvent network defenses? (Choose all that apply.) 6. Which of the following packets should never have a data payload? Page 1 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 4, Page 153 Prof. Michael P. Harris 7. Which of the following is not required for a single-packet attack? (Choose all that apply.) 8. Which of the following is an example of a multiple-packet attack? (Choose all that apply.) 9. Which of the following time to live (TTL) values is commonly used by Windows computers? (Choose all that apply.) 10. What is the purpose of the 4-byte acknowledgement number in a TCP header? 11. Which of the following is the correct order in which TCP flags appear in the course of a normal connection? 12. Which OS typically has the following as part of its signature: DgmLen 84, TTL 64, initial sequence number 0? 13. Which OS typically has alphabetic characters in its ASCII data payload? 14. Which protocol uses different port numbers to establish a connection and to transfer data? Page 2 of 3 Guide to Network Defense and Countermeasures, 2nd Edition, ISBN: 1418836796 Chapter 4, Page 153 Prof. Michael P. Harris 15. Which of the following is an example of a reconnaissance traffic signature? 16. A BackOrifice attack falls into what category of suspicious traffic signatures? 17. Which program keeps track of services and ports made available through Remote Procedure Calls? 18. What does the ASCII data payload section of an ICMP packet in Linux contain? 19. The maximum packet size that can be transmitted on a type of computer network (Ethernet, for example) is known as which of the following? 20. To avoid attacks that use advanced evasion techniques, such as path names, hexadecimal codes, and CGI scripts, you must do which of the following? (Choose all that apply.) Page 3 of 3