ITN 260 John Tyler Network Security Basics Chapter 5 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of attack is being performed when multiple computers overwhelm a system with fake requests?

DDoS

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacker to gain Web traffic to generate income, what type of attack are they using?

URL hijacking

What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

ARP poisoning

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

DNS poisoning

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.

False

What type of additional attack does ARP spoofing rely on?

MAC spoofing

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?

Privilege escalation

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

domain hijacking

What technology expands the normal capabilities of a web browser for a specific webpage?

extensions

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

whatever' AND email IS NULL; --


Conjuntos de estudio relacionados

Macroeconomics Chapter 15: Monetary Policy (Final)

View Set

Chapter 8 - Fundamentals of Fin and Acct

View Set

Loan Origination Activities Quiz 4

View Set

AP Stat Unit 1 Progress Check: MCQ Part B

View Set

Monetary Policy and Fiscal Policy

View Set

Quadratic Functions: Factored Form

View Set

Causes of World War One and the assassination of archduke Franz Ferdinand

View Set