Effective CISSP Questions

Which of the following is incorrect about the Christmas tree attack in the TCP/IP stack? (Wentz QOTD)
A. It can be used to conduct a DoS attack.
B. It can be used as a method of TCP/IP stack fingerprinting.
C. It can succeed only if the Internet Protocol (IP) is working.
D. It alternates UDP headers to observe system responses.

Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

My suggested answer is D. It alternates UDP headers to observe system responses.

Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.

TCP Sequence Diagram
TCP 3-Way Handshaking Sequence Diagram

The Christmas tree attack initiates the TCP 3-Way Handshaking and alternates TCP headers by turning on all the flags to observe system responses. Since TCP operates above and relies on the IP protocol, it cannot work if IP is not working.

TCP/IP Model
TCP/IP Model


關於 TCP/IP 協定組中的聖誕樹攻擊,以下哪項是不正確的? (Wentz QOTD)
A. 它可用於進行 DoS 攻擊。
B. 它可以用作 TCP/IP 協定組指紋識別方法。
C. 只有在互聯網協議(IP)工作的情況下才能成功。
D. 它交替 UDP 標頭以觀察系統響應。

Leave a Reply