Net Sec Chap 5 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks? A) ARP poisoning B) man-in-the-middle C) denial of service D) DNS poisoning

A) ARP Poisoning

What type of attack is being performed when multiple computers overwhelm a system with fake requests? A) DDoS B) DoS C) SYN flood D) replay attacks

A) DDoS

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? A) DNS poisoning B) Phishing C) DNS marking D) DNS overloading

A) DNS poisoning

What type of attack intercepts legitimate communication and forges a fictitious response to the sender? A) MITM B) SQL intrusion C) SIDS D) interceptor

A) MITM

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? A) Plug-ins B) Scripts C) Extensions D) Add-ons

A) Plug-ins

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred? A) Privilege escalation B) DNS cache poisoning C) ARP poisoning D) Man-in-the-middle

A) Privilege escalation

An attack that takes advantage of the procedures for initiating a session is known as what type of attack? A) SYN flood attack B) DNS amplification attack C) Smurf attack D) IP spoofing

A) SYN flood attack

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it. A) True B) False

A) True

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. A) True B) False

A) True

In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow. A) True B) False

A) True

JavaScript cannot create separate stand-alone applications. A) True B) False

A) True

Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks. A) True B) False

A) True

XSS is like a phishing attack but without needing to trick the user into visiting a malicious website. A) True B) False

A) True

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? A) XSS B) DDoS DNS C) XSRF D) SQL

A) XSS

When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack? A) denial of service B) blocking C) MITM D) spoofing

A) denial of service

Which type of attack below is similar to a passive man-in-the-middle attack? A) replay B) hijacking C) denial D) buffer overflow

A) replay

What two locations can be a target for DNS poisoning? (Choose all that apply.)

A. Local Host Table B. External DNS Serve

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

ARP

What type of privileges to access hardware and software resources are granted to users or devices?

Access rights

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer. A) True B) False

B) False

Securing web applications is easier than protecting other systems. A) True B) False

B) False

The malicious content of an XSS URL is confined to material posted on a website. A) True B) False

B) False

The malicious content of an XSS URL is confined to material posted on a website? A) True B) False

B) False

The return address is the only element that can be altered in a buffer overflow attack. A) True B) False

B) False

What type of attack involves manipulating third-party ad networks? A) Session advertising B) Malvertising C) Clickjacking D) Directory traversal

B) Malvertising

What criteria must be met for an XXS attack to occur on a specific website? A) The website must accept user input while validating it and use that input in a response. B) The website must accept user input without validating it and use that input in a response. C) The website must not accept user input without validating it and use that input in a response. D) The website must accept user input while validating it and omit that input in a response.

B) The website must accept user input without validating it and use that input in a response.

Which attack uses the user's web browser settings to impersonate that user? A) Session hijacking B) XSRF C) Domain hijacking D) XDD

B) XSRF

What type of attack intercepts communication between parties to steal or manipulate the data? A) MAC spoofing B) man-in-the-browser C) replay D) ARP poisoning

B) man-in-the-browser

Which of the following are considered to be interception attacks? (Choose all that apply.) A) amplification attack B) replay attacks C) denial of service D) man-in-the-middle

B) replay attacks D) man-in-the-middle

Which SQL injection statement example below could be used to discover the name of the table? A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); -- B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); -- C) whatever; AND 1=(SELECT COUNT(*) FROM tabname); -- D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --

B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); --

Where are MAC addresses stored for future reference? A) MAC cache B) Ethernet cache C) ARP cache D) NIC

C) ARP cache

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? A) Web server buffer and host DNS server B) Reply referrer and domain buffer C) Host table and external DNS server D) Web browser and browser add-on

C) Host table and external DNS server

What language below is used to view and manipulate data that is stored in a relational database? A) C B) DQL C) SQL D) ISL

C) SQL

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as: A) Session replay B) Session spoofing C) Session hijacking D) Session blocking

C) Session hijacking

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads, what type attack is being performed? A) ad squatting B) clickjacking C) malvertising D) ad spoofing

C) malvertising

What are the two types of cross-site attacks? (Choose all that apply.)

Cross-site sripting attacks Cross-site request forgery attacks

When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service: A) HTTP B) NSDB C) URNS D) DNS

D) DNS

What is the difference between a DoS and a DDoS attack? A) DoS attacks do not use DNS servers as DDoS attacks do B) DoS attacks are faster than DDoS attacks C) DoS attacks user more memory than a DDoS attack D) DoS attacks use fewer computers than DDoS attacks

D) DoS attacks use fewer computers than DDoS attacks

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? A) number overflow B) heap overflow C) buffer overflow D) integer overflow

D) Integer overflow

What type of additional attack does ARP spoofing rely on? A) DNS Poisoning B) replay C) MITB D) MAC spoofing

D) MAC spoofing

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor? A) pointer hack B) DNS spoofing C) clickjacking D) domain hijacking

D) domain hijacking

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database? A) whatever AND email IS NULL; -- B) whatever; AND email IS NULL; -- C) whatever" AND email IS NULL; -- D) whatever' AND email IS NULL; --

D) whatever' AND email IS NULL; --

Choose the SQL injection statement example below that could be used to find specific users: A) whatever' OR full_name IS '%Mia%' B) whatever' OR full_name = '%Mia%' C) whatever' OR full_name equals '%Mia%' D) whatever' OR full_name LIKE '%Mia%'

D) whatever' OR full_name LIKE '%Mia%'

What technology expands the normal capabilities of a web browser for a specific webpage?

Extensions

What specific ways can a session token be transmitted? (Choose all that apply.)

In the URL In the header of the HTTP requisition

What type of web server application attacks introduce new input to exploit a vulnerability?

Injection attacks

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

Smurf Attack

Attackers who register domain names that are similar to legitimate domain names are performing

URL hijacking

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacker to gain Web traffic to generate income, what type of attack are they using?

URL hijacking

The exchange of information among DNS servers regarding configured zones is known as

Zone transfer


Conjuntos de estudio relacionados

Chapter 8 Diagrams from test bank, CH.8 human a and p, Chapter 7 Diagrams from test bank, Anatomy Test 3

View Set

Physical Geology Chapter 12: Earth's Interior

View Set

L9/C3: Role of an Agent in a Real Estate Transaction/Dual Agency

View Set

Ch 3: Planning for Contingencies

View Set

All About Mackenzie(Who knows me better)

View Set

Chapter 4 - Preventing Injuries Through Fitness Training

View Set

State laws , rules, and regulations

View Set

Chapter 4: Types of Life Policies

View Set