CEH Chapter 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What could you use to inform a defensive strategy?

Attack life cycle

What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable that has been allocated space for 8 bytes?

Buffer overflow

What does a defense in breadth approach add?

Consideration for a broader range of attacks

If you were to see the following in a packet capture, what attack would you expect is happening? %3Cscr_ipt%3Ealert('wubble');%3C/sc_ript%3E

Cross-site scripting

Which protocol is commonly used for amplification attacks?

DNS

What would the Low Orbit Ion Cannon be used for?

Denial of service attacks

What is the purpose of a SYN flood?

Fill up connection buffers at the operating system.

What security element would be a crucial part of a defense in depth network design?

Firewall

What attack injects code into dynamically allocated memory?

Heap spraying

How does a slowloris attack work?

Holds open connection buffers at the web server

What protocol is used for a Smurf attack?

ICMP

What protection could be used to prevent an SQL injection attack?

Input validation

What information does a buffer overflow intend to control?

Instruction pointer

What is the target of a command injection attack?

Operating system

What element could be used to facilitate log collection, aggregation, and correlation?

SIEM

If you were to see or 1=1 in a packet capture, what would you expect was happening?

SQL injection

What technique does a slow read attack use?

Small file retrieval requests

What has been done to the following string? "%3Cscrip_t%3Ealert('wubble');%3C/scrip_t%3E"

URL encoding

What is the target of a cross-site scripting attack?

User

If you were to see the following in a packet capture, what would you think was happening? <!ENT_ITY xxe SYSTEM "file:///et_c/passwd" >]>

XML external entity injection


Ensembles d'études connexes

Concepts Exam 2 Practice Questions

View Set

chapter 3 cell structure and genetic control

View Set

Chapter 34 - The Influence of Monetary and Fiscal Policy on Aggregate Demand

View Set

DLC108: Budgeting and Personal Finance

View Set

Health Chapter 6 "Noninfectious Disease"

View Set

Foundations of Syntax true or false

View Set