ITIA 1200 Q5
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service: A. DNS B. HTTP C. URNS D. NSDB
DNS
What language below is used to view and manipulate data that is stored in a relational database? A. SQL B. DQL C. C D. ISL
SQL
What type of attack is being performed when multiple computers overwhelm a system with fake requests? A. DDoS B. SYN flood C. replay attacks D. DoS
DDOS
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address? A. DNS B. ARP C. TCP D. UDP
ARP
Where are MAC addresses stored for future reference? A. ARP cache B. MAC cache C. Ethernet cache D. NIC
ARP CACHE
If a MAC address is permanently "burned" into a network interface card, how can an attacker change the MAC address to perform an ARP poisoning attack?
ATTACKER CAN CHANGE MAC ADDRESS IN ARP CACHE
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? A. DNS overloading B. DNS poisoning C. DNS marking D. Phishing
DNS POISIONING
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor? A. DNS spoofing B. domain hijacking C. pointer hack D. clickjacking
DOMAIN HIJACKING
What two locations can be a target for DNS poisoning? (Choose all that apply.) A. external DNS server B. directory server C. local database table D. local host table
EXTERNAL DNS & LOCAL HOST TABLE
Securing web applications is easier than protecting other systems. ( TRUE OR FALSE)
FALSE
What type of additional attack does ARP spoofing rely on? A. MAC spoofing B. replay C. DNS Poisoning D. MITB
MAC SPOOFING
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred? A. ARP poisoning B. Man-in-the-middle C. Privilege escalation D. DNS cache poisoning
PRIVILEGE ESCALATION
Which of the following are considered to be interception attacks? (Choose all that apply.). A. denial of service B. replay attacks C. man-in-the-middle D. amplification attack
REPLAY ATTACKS & MAN-IN-THE-MIDDLE
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as: A. Session blocking B. Session replay C. Session spoofing D. Session hijacking
SESSION HIJACKING
An attack that takes advantage of the procedures for initiating a session is known as what type of attack? A. IP spoofing B. DNS amplification attack C. smurf attack D. SYN flood attack
SYN FLOOD ATTACK
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it. ( TRUE OR FALSE)
TRUE
A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. ( TRUE OR FALSE )
TRUE
Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks. ( TRUE OR FALSE)
TRUE
The exchange of information among DNS servers regarding configured zones is known as: A. zone transfer B. zone sharing C. zone removal D. resource request
ZONE TRANSFER