ITN 260 John Tyler Network Security Basics Chapter 5 Quiz
What type of attack is being performed when multiple computers overwhelm a system with fake requests?
DDoS
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacker to gain Web traffic to generate income, what type of attack are they using?
URL hijacking
What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?
ARP poisoning
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
DNS poisoning
A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.
False
What type of additional attack does ARP spoofing rely on?
MAC spoofing
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?
Privilege escalation
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
domain hijacking
What technology expands the normal capabilities of a web browser for a specific webpage?
extensions
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?
whatever' AND email IS NULL; --