Ch 5 - Networking & Server Attacks

Beschreibung

Ch 5 quiz
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor mehr als 6 Jahre
1272
0

Zusammenfassung der Ressource

Frage 1

Frage
A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
Antworten
  • True
  • False

Frage 2

Frage
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
Antworten
  • True
  • False

Frage 3

Frage
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Antworten
  • Session replay
  • Session spoofing
  • Session hijacking
  • Session blocking

Frage 4

Frage
An attack that takes advantage of the procedures for initiating a session is known as what type of attack?
Antworten
  • DNS amplification attack
  • IP spoofing
  • smurf attack
  • SYN flood attack

Frage 5

Frage
A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.
Antworten
  • True
  • False

Frage 6

Frage
Choose the SQL injection statement example below that could be used to find specific users:
Antworten
  • whatever' OR full_name = '%Mia%'
  • whatever' OR full_name IS '%Mia%'
  • whatever' OR full_name LIKE '%Mia%'
  • whatever' OR full_name equals '%Mia%'

Frage 7

Frage
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
Antworten
  • DNS poisoning
  • Phishing
  • DNS marking
  • DNS overloading

Frage 8

Frage
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?
Antworten
  • spoofing
  • URL hijacking
  • Web squatting
  • typo hijacking

Frage 9

Frage
In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.
Antworten
  • True
  • False

Frage 10

Frage
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?
Antworten
  • Privilege escalation
  • DNS cache poisoning
  • ARP poisoning
  • Man-in-the-middle

Frage 11

Frage
Securing web applications is easier than protecting other systems.
Antworten
  • True
  • False

Frage 12

Frage
The exchange of information among DNS servers regarding configured zones is known as:
Antworten
  • resource request
  • zone sharing
  • zone transfer
  • zone removal

Frage 13

Frage
The malicious content of an XSS URL is confined to material posted on a website
Antworten
  • True
  • False

Frage 14

Frage
The return address is the only element that can be altered in a buffer overflow attack.
Antworten
  • True
  • False

Frage 15

Frage
Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks.
Antworten
  • True
  • False

Frage 16

Frage
What are the two types of cross-site attacks? (Choose all that apply.)
Antworten
  • cross-site input attacks
  • cross-site scripting attacks
  • cross-site request forgery attacks
  • cross-site flood attacks

Frage 17

Frage
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
Antworten
  • pointer hack
  • DNS spoofing
  • clickjacking
  • domain hijacking

Frage 18

Frage
What criteria must be met for an XXS attack to occur on a specific website?
Antworten
  • The website must accept user input while validating it and use that input in a response
  • The website must accept user input without validating it and use that input in a response
  • The website must not accept user input without validating it and use that input in a response
  • The website must accept user input while validating it and omit that input in a response

Frage 19

Frage
What language below is used to view and manipulate data that is stored in a relational database?
Antworten
  • C
  • DQL
  • SQL
  • ISL

Frage 20

Frage
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?
Antworten
  • DNS
  • ARP
  • TCP
  • UDP

Frage 21

Frage
What specific ways can a session token be transmitted? (Choose all that apply.)
Antworten
  • In the URL
  • In the trailer of a frame
  • In the header of a packet
  • In the header of the HTTP requisition

Frage 22

Frage
What technology expands the normal capabilities of a web browser for a specific webpage?
Antworten
  • extensions
  • add-ons
  • plug-ins
  • Java applets

Frage 23

Frage
What two locations can be a target for DNS poisoning? (Choose all that apply.)
Antworten
  • local host table
  • external DNS server
  • local database table
  • directory server

Frage 24

Frage
What type of additional attack does ARP spoofing rely on?
Antworten
  • DNS poisoning
  • replay
  • MITB
  • MAC spoofing

Frage 25

Frage
What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?
Antworten
  • ARP poisoning
  • man-in-the-middle
  • denial of service
  • DNS poisoning

Frage 26

Frage
What type of attack intercepts communication between parties to steal or manipulate the data?
Antworten
  • replay
  • MAC spoofing
  • man-in-the-browser
  • ARP poisoning

Frage 27

Frage
What type of attack is being performed when multiple computers overwhelm a system with fake requests?
Antworten
  • DDoS
  • DoS
  • SYN flood
  • replay attacks

Frage 28

Frage
What type of privileges to access hardware and software resources are granted to users or devices?
Antworten
  • access privileges
  • user rights
  • access rights
  • permissions

Frage 29

Frage
What type of web server application attacks introduce new input to exploit a vulnerability?
Antworten
  • language attacks
  • cross-site request attacks
  • hijacking attacks
  • injection attacks

Frage 30

Frage
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads, what type attack is being performed?
Antworten
  • ad squatting
  • clickjacking
  • malvertising
  • ad spoofing

Frage 31

Frage
When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?
Antworten
  • MITM
  • spoofing
  • denial of service
  • blocking

Frage 32

Frage
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
Antworten
  • HTTP
  • NSDB
  • URNS
  • DNS

Frage 33

Frage
Where are MAC addresses stored for future reference?
Antworten
  • MAC cache
  • Ethernet cache
  • ARP cache
  • NIC

Frage 34

Frage
Which of the following are considered to be interception attacks? (Choose all that apply.)
Antworten
  • denial of service
  • amplification attack
  • man-in-the-middle
  • replay attacks

Frage 35

Frage
Which SQL injection statement example below could be used to discover the name of the table?
Antworten
  • whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
  • whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
  • whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
  • whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --

Frage 36

Frage
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?
Antworten
  • whatever AND email IS NULL; --
  • whatever; AND email IS NULL; --
  • whatever" AND email IS NULL; --
  • whatever' AND email IS NULL; --

Frage 37

Frage
Which type of attack below is similar to a passive man-in-the-middle attack?
Antworten
  • replay
  • hijacking
  • denial
  • buffer overflow

Frage 38

Frage
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?
Antworten
  • IP spoofing
  • denial of service
  • DNS poisoning
  • smurf attack

Frage 39

Frage
XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
CCNA Answers – CCNA Exam
Abdul Demir
SQL Quiz
R M
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002