Mod 17

Ace your homework & exams now with Quizwiz!

How can a DNS tunneling attack be mitigated? -by hiding the SSID -by using a filter that inspects DNS traffic -by securing all domain owner accounts -none of the other options -by using strong passwords and two-factor authentication -by preventing devices from using gratuitous ARP

by using a filter that inspects DNS traffic

What would be the target of an SQL injection attack? -IP -DNS -none of the other options -email -database -ARP -DHCP -MAC

database

What are two methods used by cybercriminals to mask DNS attacks? (Choose two.) -snooping -fast flux -tunneling -domain generation algorithms -shadowing -none of the other options -spoofing -reflection

fast flux, domain generation algorithms

What is the function of a gratuitous ARP sent by a networked device when it boots up? -none of the other options -to request the MAC address of the DNS server -to request the netbios name of the connected system -to request the IP address of the connected network -to advise connected devices of its MAC address -to request the IP address of the DHCP server

to advise connected devices of its MAC address

What is the result of a passive ARP poisoning attack? -none of the other options -Confidential information is intercepted. -Network clients experience a denial of service. -Data is modified in transit or malicious data is inserted in transit. -Packet headers are intercepted. -Multiple subdomains are created.

Confidential information is intercepted.

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? -Cross-site scripting -SQL injection -XML injection -buffer overflow -none of the other options -command injection

Cross-site scripting

Which cyber-attack involves a coordinated attack from a botnet of zombie computers? -DDoS -none of the other options -address spoofing -packet spoofing -ICMP redirect -MITM

DDoS

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this? -DHCP spoofing -DHCP snooping -MAC address starvation -distributed denial of service -none of the other options -packet spoofing -MAC address snooping

DHCP spoofing

What technique is a security attack that depletes the pool of IP addresses available for legitimate hosts? -DHCP spoofing -MAC spoofing -DHCP starvation -none of the other options -MAC snooping -DHCP snooping -reconnaissance attack

DHCP starvation

Which protocol is exploited by cybercriminals who create malicious iFrames? -DHCP -ARP -none of the other options -HTTP -MAC -DNS

HTTP


Related study sets

Software Engineering Final Study Guide

View Set

Ch. 12 Life Insurance Planning T/F

View Set

3) Homonymous Hemianopia & Hemi-neglect

View Set