Chapter 5: Networking and Server Attacks

Ace your homework & exams now with Quizwiz!

A replay attack _______. (Enter letter for answer) A) makes a copy of the transmission for use at a later time. B) can be prevented by patching the web browser. C) is considered to be a type of DoS attack. D) replays the attack over and over to flood the server.

A

What is a session token? (Enter letter for answer) A) a random string assigned by a web server. B) XML code used in an XML injection attack. C) another name for a third-party cookie. D) a unique identifier that includes the user's email address.

A

DNS poisoning _________. (Enter letter for answer) A) is the same as ARP poisoning. B) substitutes DNS addresses so that the computer is automatically redirected to another device. C) floods a DNS server with requests until it can no longer respond. D) is rarely found today due to the use of host tables.

B

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? (Enter letter for answer) A) Web server buffer and host DNS server B) Host table and external DNS server C) Reply referrer and domain buffer D) Web browser and browser add-on

B

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? (Enter letter for answer) A) The complex nature of TCP/IP allows for too many ping sweeps to be blocked. B) Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks. C) Web application attacks use web browsers that cannot be controlled on a local computer. D) Network security devices cannot prevent attacks from web resources.

B

Why are extensions, plug-ins, and add-ons considered to be security risks? (Enter letter for answer) A) They are written in Java, which is a weak language. B) They have introduced vulnerabilities in browsers. C) They use bitcode. D) They cannot be uninstalled.

B

What is the difference between a DoS and a DDoS attack? (Enter letter for answer) A) DoS attacks are faster than DDoS attacks B) DoS attacks use more memory than a DDoS attack C) DoS attacks use fewer computers than DDoS attacks D) DoS attacks do not use DNS servers as DDoS attacks do

C

What is the basis of an SQL injection attack? (Enter letter for answer) A) to have the SQL server attack client web browsers B) to link SQL servers into a botnet C) to expose SQL code so that it can be examined D) to insert SQL statements through unfiltered user input

D

Which action cannot be performed through a successful SQL injection attack? (Enter letter for answer) A) display a list of customer telephone numbers. B) erase a database table. C) discover the names of different fields in a table. D) reformat the web application server's hard drive.

D

What type of attack intercepts legitimate communication and forges a fictitious response to the sender? A) SIDS B) interceptor C) SQL intrusion D) MITM

MITM

What type of attack involves manipulating third-party ad networks? A) Session advertising B) Directory traversal C) Clickjacking D) Malvertising

Malvertising

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? A) Extensions B) Add-ons C) Scripts D) Plug-ins

Plug-ins

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? A) Amplification B) Privilege escalation C) Scaling exploit D) Session replay

Privilege escalation

Attackers who register domain names that are similar to legitimate domain names are performing _______. A) HTTP manipulation B) Address resolution C) HTML squatting D) URL hijacking

URL hijacking

Which attack uses the user's web browser settings to impersonate that user? A) XDD B) Session hijacking C) XSRF D) Domain hijacking

XSRF

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? A) XSRF B) XSS C) SQL D) DDoS DNS

XSS

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? A) integer overflow B) heap overflow C) number overflow D) buffer overflow

integer overflow

Which attack intercepts communications between a web browser and the underlying computer? A) ARP poisoning B) replay C) man-in-the-middle (MITM) D) man-in-the-browser (MITB)

man-in-the-browser (MITB)

What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? A) privilege escalation B) horizontal access attack C) transverse attack D) cross-site attack

privilege escalation

Which of these is NOT a DoS attack? A) smurf attack B) push flood C) DNS amplification D) SYN flood

push flood


Related study sets

PHI2604 - Midterm Review (chapter 9, 10, & 12 from the book)

View Set

macro chapter 23, 24, 25, 26 (exam 2)

View Set

SOC 134-given practice questions for MT 2

View Set

Unit 5 - The Research & Writing Processes

View Set

Maternity & Pediatrics - Ricci Chapters 25-36 end of chapter questions

View Set

8-11 Dynamic Study Modules (After ch 8 only misses)

View Set

PSYC3020 Lecture 3 - Reliability

View Set