Comptia Security + Chapter 4 Types of attacks

Ace your homework & exams now with Quizwiz!

What type of attack involves the hacker sending too much data to an application that typically results in the hacker gaining remote access to the system with administrative permissions? A. Buffer overflow B. SQL injection C. Folder traversal D. Cross-site scripting

A. Buffer overflow

What type of attack is a smurf attack? A. DDoS B. DoS C. DNS poison D. MITM

A. DDoS

Which of the following is a popular method to protect against dictionary attacks? A. Password complexity B. Account lockout C. Network firewall D. Intrusion detection system

A. Password complexity

What is the term used for a phishing attack that is targeted toward a specific person such as the executive of a company? A. Whaling B. Phishing C. Pharming D. Spim

A. Whaling

Your manager has been reading a lot about popular password attacks such as dictionary attacks and brute-force attacks. Your manager is worried that your company is susceptible to such attacks. Which of the following controls will help protect against a brute-force attack? A. Password complexity B. Account lockout C. Network firewall D. Intrusion detection system

B. Account lockout

Your manager has read reports of tailgating being a problem with security in many organizations and wants to know what can be done to prevent tailgating. Which of the following controls will help protect against tailgating? A. Locked doors B. Electronic keypads C. Swipe cards D. Mantrap

D. Mantrap

You are monitoring network traffic and you notice a packet with pass' or 1=1-- in the content of the packet. What type of attack has occurred? A. Buffer overflow B. SQL injection C. Folder traversal D. Cross-site scripting

B. SQL injection

Your manager has called you into the office and has expressed concerns about a number of news reports on social engineering attacks. Your manager would like to know what can be done to protect the company against social engineering attacks. What is your response? A. Use a firewall. B. User awareness and training. C. Install antivirus software. D. Implement physical security.

B. User awareness and training.

What file can the hacker modify after compromising your system that could lead you to the wrong web site? A. sam B. hosts C. lmhosts D. services

B. hosts

What type of attack results in the victim's system not being able to perform its job function? A. Man-in-the-middle B. Spoofing C. Denial of service D. Port scanning

C. Denial of service

When looking at the web server log files, you notice that a lot of the requests that have hit the web site are navigating to the /scripts/..%c0%af../winnt/system32 folder. What type of attack is occurring? A. Buffer overflow B. SQL injection C. Folder traversal D. Cross-site scripting

C. Folder traversal

A hacker tries to compromise your system by submitting script code into a field in a web page that is then submitted and stored as data in the web site database. The hacker is anticipating when you navigate to the site and display the data, that your browser will parse the script and execute it. What type of attack is this? A. Buffer overflow B. SQL injection C. Folder traversal D. Cross-site scripting

D. Cross-site scripting

The hacker has managed to poison everyone's ARP cache so that all traffic to the Internet is being sent to the hacker's system before being routed out to the Internet. What type of attack is this? A. DDoS B. DoS C. Phishing D. MITM

D. MITM

With a dictionary attack, how does the password-cracking software attempt to figure out the passwords of the different user accounts? A. Calculates all possible passwords B. Uses the passwords stored in the SAM database C. Uses the entries in the /etc/passwd file D. Reads the passwords from a word list file

D. Reads the passwords from a word list file

John has been studying techniques used by hackers and decides to send a packet to your system, but ensures that he alters the source IP address of the packet so it looks like it came from someone else. What type of attack is this? A. Phishing B. Pharming C. Spim D. Spoofing

D. Spoofing


Related study sets

Essentials of Pediatric Nursing - Chapter 26

View Set

Learning and memory chpt 7 & 8 quiz

View Set

Med Surg Intestinal and Rectal Disorders

View Set

Gallbladder Disease Summer Test 5

View Set

Quiz : DNA replication (with some DNA structure review)

View Set

Chapter 8 11.5& 11.6 Organizational Behavior

View Set

food protection course: storing food

View Set