Mod 17
How can a DNS tunneling attack be mitigated? -by hiding the SSID -by using a filter that inspects DNS traffic -by securing all domain owner accounts -none of the other options -by using strong passwords and two-factor authentication -by preventing devices from using gratuitous ARP
by using a filter that inspects DNS traffic
What would be the target of an SQL injection attack? -IP -DNS -none of the other options -email -database -ARP -DHCP -MAC
database
What are two methods used by cybercriminals to mask DNS attacks? (Choose two.) -snooping -fast flux -tunneling -domain generation algorithms -shadowing -none of the other options -spoofing -reflection
fast flux, domain generation algorithms
What is the function of a gratuitous ARP sent by a networked device when it boots up? -none of the other options -to request the MAC address of the DNS server -to request the netbios name of the connected system -to request the IP address of the connected network -to advise connected devices of its MAC address -to request the IP address of the DHCP server
to advise connected devices of its MAC address
What is the result of a passive ARP poisoning attack? -none of the other options -Confidential information is intercepted. -Network clients experience a denial of service. -Data is modified in transit or malicious data is inserted in transit. -Packet headers are intercepted. -Multiple subdomains are created.
Confidential information is intercepted.
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? -Cross-site scripting -SQL injection -XML injection -buffer overflow -none of the other options -command injection
Cross-site scripting
Which cyber-attack involves a coordinated attack from a botnet of zombie computers? -DDoS -none of the other options -address spoofing -packet spoofing -ICMP redirect -MITM
DDoS
An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this? -DHCP spoofing -DHCP snooping -MAC address starvation -distributed denial of service -none of the other options -packet spoofing -MAC address snooping
DHCP spoofing
What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts? -DHCP spoofing -MAC spoofing -DHCP starvation -none of the other options -MAC snooping -DHCP snooping -reconnaissance attack
DHCP starvation
Which protocol is exploited by cybercriminals who create malicious iFrames? -DHCP -ARP -none of the other options -HTTP -MAC -DNS
HTTP
