SEC + CHAPTER 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

DNS Poisoning

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

c. whatever' OR full_name LIKE '%Mia%'

Choose the SQL injection statement example below that could be used to find specific users: a. whatever' OR full_name = '%Mia%' b. whatever' OR full_name IS '%Mia%' c. whatever' OR full_name LIKE '%Mia%' d. whatever' OR full_name equals '%Mia%'

b. cross-site scripting attacks c. cross-site request forgery attacks

What are the two types of cross-site attacks? (Choose all that apply.) a. cross-site input attacks b. cross-site scripting attacks c. cross-site request forgery attacks d. cross-site flood attacks

domain hijacking

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

The website must accept user input without validating it and use that input in a response.

What criteria must be met for an XSS attack to occur on a specific website?

SQL

What language below is used to view and manipulate data that is stored in a relational database?

ARP

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

a. in the url d. in the header of the HTTP requisition

What specific ways can a session token be transmitted? (Choose all that apply.) a. In the URL. b. In the trailer of a frame. c. In the header of a packet. d. In the header of the HTTP requisition.

extensions

What technology expands the normal capabilities of a web browser for a specific webpage?

Session hijacking

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

SYN flood attack

An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

URL Hijacking

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?

privilege escalation

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?

zone transfer

The exchange of information among DNS servers regarding configured zones is known as:

local host table local database table

What two locations can be a target for DNS poisoning? (Choose all that apply.) a. local host table b. external DNS server c. local database table d. directory server

MAC spoofing

What type of additional attack does ARP spoofing rely on?

ARP Poisoning

What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

Man-in-the-browser

What type of attack intercepts communication between parties to steal or manipulate the data?

DDoS

What type of attack is being performed when multiple computers overwhelm a system with fake requests?

access rights

What type of privileges to access hardware and software resources are granted to users or devices?

injection attacks

What type of web server application attacks introduce new input to exploit a vulnerability?

DNS

When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

denial of service (DoS)

When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?

malvertising

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads, what type attack is being performed?

ARP cache

Where are MAC addresses stored for future reference?

b. whatever' AND 1=(SELECT COUNT(*) FROM tabname); --

Which SQL injection statement example below could be used to discover the name of the table? a. whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); -- b. whatever' AND 1=(SELECT COUNT(*) FROM tabname); -- c. whatever; AND 1=(SELECT COUNT(*) FROM tabname); -- d. whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --

whatever' AND email IS NULL; --

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

c. man-in-the-middle d. replay attacks

Which of the following are considered to be interception attacks? (Choose all that apply.) a. denial of service b. amplification attack c. man-in-the-middle d. replay attacks

replay

Which type of attack below is similar to a passive man-in-the-middle attack?

smurf attack

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?


Set pelajaran terkait

Functions and Inverse Function Vocabulary

View Set

Chapter 3 - Working with Financial Statements - Qz 01

View Set

Chapter 2: Basic Financial Statements

View Set