ITIA 1200 Q5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service: A. DNS B. HTTP C. URNS D. NSDB

DNS

What language below is used to view and manipulate data that is stored in a relational database? A. SQL B. DQL C. C D. ISL

SQL

What type of attack is being performed when multiple computers overwhelm a system with fake requests? A. DDoS B. SYN flood C. replay attacks D. DoS

DDOS

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address? A. DNS B. ARP C. TCP D. UDP

ARP

Where are MAC addresses stored for future reference? A. ARP cache B. MAC cache C. Ethernet cache D. NIC

ARP CACHE

If a MAC address is permanently "burned" into a network interface card, how can an attacker change the MAC address to perform an ARP poisoning attack?

ATTACKER CAN CHANGE MAC ADDRESS IN ARP CACHE

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? A. DNS overloading B. DNS poisoning C. DNS marking D. Phishing

DNS POISIONING

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor? A. DNS spoofing B. domain hijacking C. pointer hack D. clickjacking

DOMAIN HIJACKING

What two locations can be a target for DNS poisoning? (Choose all that apply.) A. external DNS server B. directory server C. local database table D. local host table

EXTERNAL DNS & LOCAL HOST TABLE

Securing web applications is easier than protecting other systems. ( TRUE OR FALSE)

FALSE

What type of additional attack does ARP spoofing rely on? A. MAC spoofing B. replay C. DNS Poisoning D. MITB

MAC SPOOFING

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred? A. ARP poisoning B. Man-in-the-middle C. Privilege escalation D. DNS cache poisoning

PRIVILEGE ESCALATION

Which of the following are considered to be interception attacks? (Choose all that apply.). A. denial of service B. replay attacks C. man-in-the-middle D. amplification attack

REPLAY ATTACKS & MAN-IN-THE-MIDDLE

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as: A. Session blocking B. Session replay C. Session spoofing D. Session hijacking

SESSION HIJACKING

An attack that takes advantage of the procedures for initiating a session is known as what type of attack? A. IP spoofing B. DNS amplification attack C. smurf attack D. SYN flood attack

SYN FLOOD ATTACK

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it. ( TRUE OR FALSE)

TRUE

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. ( TRUE OR FALSE )

TRUE

Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks. ( TRUE OR FALSE)

TRUE

The exchange of information among DNS servers regarding configured zones is known as: A. zone transfer B. zone sharing C. zone removal D. resource request

ZONE TRANSFER


Ensembles d'études connexes

Chapter 14 and 16 Financial Markets

View Set

Certified Advance Admin Reviewer 211- updated

View Set

Physiology WK 10.1 Chapter 19 Blood Flow My Lab & Mastering

View Set

Earle History 2 5 18 Quiz Nazi-Soviet Nonaggression Pact

View Set