Ch 5 Security+ 6th Edition

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

*Question #5* *An attacker who manipulates the maximum size of an integer type would be performing what kind of attack*? A. integer overflow B. buffer overflow C. number overflow D. heap overflow

A. *integer overflow* *page 214*

*Question #3* *Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about*? A. Privilege escalation B. Session replay C. Scaling exploit D. Amplification

A. Privilege escalation *page 200*

*Question #6* *What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another*? A. privilege escalation B. cross-site attack C. horizontal access attack D. transverse attack

A. privilege escalation *page 201*

*Question #14* *What type of attack involves manipulating third-party ad networks*? A. Session advertising B. Malvertising C. Clickjacking D. Directory traversal

B. *Malvertising* *pages 215-217*

*Question #15* *Why are extensions, plug-ins, and add-ons considered to be security risks*? A. They are written in Java, which is a weak language. B. They have introduced vulnerabilities in browsers. C. They use bitcode. D. They cannot be uninstalled.

B. *They have introduced vulnerabilities in browsers*. *page 218*

*Question #10* *Which attack uses the user's web browser settings to impersonate that user*? A. XDD B. XSRF C. Domain hijacking D. Session hijacking

B. *XSRF* *page 207*

*Question #16* *What is a session token*? A. XML code used in an XML injection attack B. a random string assigned by a web server C. another name for a third-party cookie D. a unique identifier that includes the user's email address

B. *a random string assigned by a web server* *page 210*

*Question 12* *Which action cannot be performed through a successful SQL injection attack*? A. discover the names of different fields in a table B. reformat the web application server's hard drive C. display a list of customer telephone numbers D. erase a database table

B. *reformat the web application server's hard drive* *page 209*

*Question #8* *What is the difference between a DoS and a DDoS attack*? A. DoS attacks are faster than DDoS attacks B. DoS attacks use fewer computers than DDoS attacks C. DoS attacks do not use DNS servers as DDoS attacks do D. DoS attacks user more memory than a DDoS attack

B. DoS attacks use fewer computers than DDoS attacks

*Question #9* *John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing*? A. SQL B. XSS C. XSRF D. DDoS DNS

B. XSS

*Question #1* *Which attack intercepts communications between a web browser and the underlying computer*? A. man-in-the-middle (MITM) B. man-in-the-browser (MITB) C. replay D. ARP poisoning

B. man-in-the-browser (MITB) *page 195*

*Question #4* *Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? A. Extensions B. Scripts C. Plug-ins D. Add-ons

C. *Plug-ins* found on *page 219*

*Question #19* *A replay attack _____. A. can be prevented by patching the web browser B. is considered to be a type of DoS attack C. makes a copy of the transmission for use at a later time D. replays the attack over and over to flood the server

C. *makes a copy of the transmission for use at a later time* *page 196*

*Question 11* *What is the basis of an SQL injection attack*? A. to expose SQL code so that it can be examined B. to have the SQL server attack client web browsers C. to insert SQL statements through unfiltered user input D. to link SQL servers into a botnet

C. *to insert SQL statements through unfiltered user input* *page 207*

*Question #18* *What type of attack intercepts legitimate communication and forges a fictitious response to the sender*? A. SIDS B. interceptor C. MITM D. SQL intrusion

C. MITM *Page 194*

*Question #20* *DNS poisoning* _____. A. floods a DNS server with requests until it can no longer respond B. is rarely found today due to the use of host tables C. substitutes DNS addresses so that the computer is automatically redirected to another device D. is the same as ARP poisoning

C. substitutes DNS addresses so that the computer is automatically redirected to another device *page 199*

*Question #13* *Attackers who register domain names that are similar to legitimate domain names are performing* _____. A. Address resolution B. HTTP manipulation C. HTML squatting D. URL hijacking

D. *URL hijacking* *page 211*

*Question #2* *Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect*? A. Web server buffer and host DNS server B. Reply referrer and domain buffer C. Web browser and browser add-on D. Host table and external DNS server

D. Host table and external DNS server *page 199*

*Question #7* *Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks*? A. The complex nature of TCP/IP allows for too many ping sweeps to be blocked. B. Web application attacks use web browsers that cannot be controlled on a local computer. C. Network security devices cannot prevent attacks from web resources. D. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

D. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

*Question #17* *Which of these is not a DoS attack*? A. SYN flood B. DNS amplification C. smurf attack D. push flood

D. push flood *page 202*


Ensembles d'études connexes

SECFND: Understanding Network Applications

View Set

SIE Exam - Section 5 Municipal Bonds

View Set

Legal Issues: Whistleblowing Obligation to Report

View Set

NUR3010: Chapter 6- PrepU Quizzes

View Set

Chapter 59: Dementia and Delirium (NCLEX)

View Set