Network Defense Essentials (NDE) Practice Exam 2025 - Free Network Defense Practice Questions and Study Guide

Question: 1 / 545

Which of the following would be an example of an attack using composite signatures?

IP Spoofing

ICMP Flooding

An example of an attack using composite signatures is ICMP Flooding. Composite signatures are utilized in network defense mechanisms to identify specific types of attacks that may not be detectable through simple or single signature definitions. These signatures consider multiple characteristics or patterns of traffic to define an attack, rather than relying on a single attribute.

ICMP Flooding involves sending a large number of ICMP packets, often in the form of echorequests, to overwhelm the target's resources, making it an example of a network-layer denial-of-service attack. This kind of attack can be detected using composite signatures by monitoring the frequency and nature of ICMP traffic, as well as noting unusual behavior patterns typical of flooding scenarios.

The other options, while they represent legitimate security concerns, do not serve as appropriate examples of attacks specifically identified through composite signatures in the same manner as ICMP Flooding. For instance, IP Spoofing generally focuses on manipulation of the IP packet headers, DNS Poisoning is about altering DNS records, and TCP Hijacking revolves around taking control of an active TCP session. Each of these relies on different methods of defense and detection, often not involving the multi-faceted nature of composite signatures.

Get further explanation with Examzify DeepDiveBeta

DNS Poisoning

TCP Hijacking

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy