Security+ Chapter 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the two types of cross-site attacks? (Choose all that apply.) A. cross-site request forgery attacks B. cross-site input attacks C. cross-site flood attacks D. cross-site scripting attacks

A. Cross-site request forgery attacks D. cross-site scripting attacks

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? A. DNS poisoning B. DNS overloading C. Phishing D. DNS marking

A. DNS poisoning

What is the difference between a DoS and a DDoS attack? A. DoS attacks use fewer computers than DDoS attacks B. DoS attacks do not use DNS servers as DDoS attacks do C. DoS attacks user more memory than a DDoS attack D. DoS attacks are faster than DDoS attacks

A. DoS attacks use fewer computers than DDoS attacks

The malicious content of an XSS URL is confined to material posted on a website A. False B. True

A. False

The return address is the only element that can be altered in a buffer overflow attack. A. False B. True

A. False

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? A. Plug-ins B. Add-ons C. Scripts D. Extensions

A. Plug-ins

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred? A. Privilege escalation B. ARP poisoning C. Man-in-the-middle D. DNS cache poisoning

A. Privilege escalation

What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? A. privilege escalation B. transverse attack C. horizontal access attack D. cross-site attack

A. Privilege escalation

What language below is used to view and manipulate data that is stored in a relational database? A. SQL B. DQL C. C D. ISL

A. SQL

An attack that takes advantage of the procedures for initiating a session is known as what type of attack? A. SYN flood attack B. IP spoofing C. smurf attack D. DNS amplification attack

A. SYN flood attack

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it. A. True B. Flase

A. True

JavaScript cannot create separate stand-alone applications. A. True B. False

A. True

Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks. A. True B. False

A. True

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? A. integer overflow B. buffer overflow C. number overflow D. heap overflow

A. integer overflow

The exchange of information among DNS servers regarding configured zones is known as: A. zone transfer B. resource request C. zone sharing D. zone removal

A. zone transfer

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer. A. True B. False

B. False

Securing web applications is easier than protecting other systems. A. True B. False

B. False

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? A. Session replay B. Privilege escalation C. Scaling exploit D. Amplification

B. Privilege escalation

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. A. False B. True

B. True

In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow. A. False B. True

B. True

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? A. SQL B. XSS C. DDoS DNS D. XSRF

B. XSS

Choose the SQL injection statement example below that could be used to find specific users: A. whatever' OR full_name IS '%Mia%' B. whatever' OR full_name LIKE '%Mia%' C. whatever' OR full_name = '%Mia%' D. whatever' OR full_name equals '%Mia%'

B. whatever' OR full_name LIKE '%Mia%'

Which attack uses the user's web browser settings to impersonate that user? A. Domain hijacking B. Session hijacking C. XSRF D. XDD

C.

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as: A. Session blocking B. Session spoofing C. Session hijacking D. Session replay

C. Session hijacking

What criteria must be met for an XXS attack to occur on a specific website? A. The website must not accept user input without validating it and use that input in a response. B. The website must accept user input while validating it and use that input in a response. C. The website must accept user input without validating it and use that input in a response. D. The website must accept user input while validating it and omit that input in a response.

C. The website must accept user input without validating it and use that input in a response.

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? A. Web application attacks use web browsers that cannot be controlled on a local computer. B. The complex nature of TCP/IP allows for too many ping sweeps to be blocked. C. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks. D. Network security devices cannot prevent attacks from web resources.

C. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using? A. spoofing B. typo hijacking C. URL hijacking D. Web squatting

C. URL hijacking

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor? A. pointer hack B. DNS spoofing C. domain hijacking D. clickjacking

C. domain hijacking

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? A. Web browser and browser add-on B. Reply referrer and domain buffer C. Web server buffer and host DNS server D. Host table and external DNS server

D. Host table and external DNS server

Which attack intercepts communications between a web browser and the underlying computer? A. ARP poisoning B. replay C. man-in-the-middle (MITM) D. man-in-the-browser (MITB)

D. man-in-the-browser (MITB)


Set pelajaran terkait

12-PROJECT PROCUREMENT MANAGEMENT

View Set

EMT Basic Chapter 28 Head and Spine Injuries, EMT Basic Chapter 27 Face and Neck Injuries

View Set

International Marketing Module 3 Exam

View Set