C Danvers
Quiz by , created more than 1 year ago

Ch 5 quiz

1260
0
0
C Danvers
Created by C Danvers about 6 years ago
Close

Ch 5 - Networking & Server Attacks

Question 1 of 39

1

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 39

1

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 39

1

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

Select one of the following:

  • Session replay

  • Session spoofing

  • Session hijacking

  • Session blocking

Explanation

Question 4 of 39

1

An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

Select one of the following:

  • DNS amplification attack

  • IP spoofing

  • smurf attack

  • SYN flood attack

Explanation

Question 5 of 39

1

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 39

1

Choose the SQL injection statement example below that could be used to find specific users:

Select one of the following:

  • whatever' OR full_name = '%Mia%'

  • whatever' OR full_name IS '%Mia%'

  • whatever' OR full_name LIKE '%Mia%'

  • whatever' OR full_name equals '%Mia%'

Explanation

Question 7 of 39

1

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

Select one of the following:

  • DNS poisoning

  • Phishing

  • DNS marking

  • DNS overloading

Explanation

Question 8 of 39

1

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income, what type of attack are they using?

Select one of the following:

  • spoofing

  • URL hijacking

  • Web squatting

  • typo hijacking

Explanation

Question 9 of 39

1

In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 39

1

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?

Select one of the following:

  • Privilege escalation

  • DNS cache poisoning

  • ARP poisoning

  • Man-in-the-middle

Explanation

Question 11 of 39

1

Securing web applications is easier than protecting other systems.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 39

1

The exchange of information among DNS servers regarding configured zones is known as:

Select one of the following:

  • resource request

  • zone sharing

  • zone transfer

  • zone removal

Explanation

Question 13 of 39

1

The malicious content of an XSS URL is confined to material posted on a website

Select one of the following:

  • True
  • False

Explanation

Question 14 of 39

1

The return address is the only element that can be altered in a buffer overflow attack.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 39

1

Traditional network security devices can block traditional network attacks, but they cannot always block web application attacks.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 39

1

What are the two types of cross-site attacks? (Choose all that apply.)

Select one or more of the following:

  • cross-site input attacks

  • cross-site scripting attacks

  • cross-site request forgery attacks

  • cross-site flood attacks

Explanation

Question 17 of 39

1

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

Select one of the following:

  • pointer hack

  • DNS spoofing

  • clickjacking

  • domain hijacking

Explanation

Question 18 of 39

1

What criteria must be met for an XXS attack to occur on a specific website?

Select one of the following:

  • The website must accept user input while validating it and use that input in a response

  • The website must accept user input without validating it and use that input in a response

  • The website must not accept user input without validating it and use that input in a response

  • The website must accept user input while validating it and omit that input in a response

Explanation

Question 19 of 39

1

What language below is used to view and manipulate data that is stored in a relational database?

Select one of the following:

  • C

  • DQL

  • SQL

  • ISL

Explanation

Question 20 of 39

1

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

Select one of the following:

  • DNS

  • ARP

  • TCP

  • UDP

Explanation

Question 21 of 39

1

What specific ways can a session token be transmitted? (Choose all that apply.)

Select one or more of the following:

  • In the URL

  • In the trailer of a frame

  • In the header of a packet

  • In the header of the HTTP requisition

Explanation

Question 22 of 39

1

What technology expands the normal capabilities of a web browser for a specific webpage?

Select one of the following:

  • extensions

  • add-ons

  • plug-ins

  • Java applets

Explanation

Question 23 of 39

1

What two locations can be a target for DNS poisoning? (Choose all that apply.)

Select one or more of the following:

  • local host table

  • external DNS server

  • local database table

  • directory server

Explanation

Question 24 of 39

1

What type of additional attack does ARP spoofing rely on?

Select one of the following:

  • DNS poisoning

  • replay

  • MITB

  • MAC spoofing

Explanation

Question 25 of 39

1

What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

Select one of the following:

  • ARP poisoning

  • man-in-the-middle

  • denial of service

  • DNS poisoning

Explanation

Question 26 of 39

1

What type of attack intercepts communication between parties to steal or manipulate the data?

Select one of the following:

  • replay

  • MAC spoofing

  • man-in-the-browser

  • ARP poisoning

Explanation

Question 27 of 39

1

What type of attack is being performed when multiple computers overwhelm a system with fake requests?

Select one of the following:

  • DDoS

  • DoS

  • SYN flood

  • replay attacks

Explanation

Question 28 of 39

1

What type of privileges to access hardware and software resources are granted to users or devices?

Select one of the following:

  • access privileges

  • user rights

  • access rights

  • permissions

Explanation

Question 29 of 39

1

What type of web server application attacks introduce new input to exploit a vulnerability?

Select one of the following:

  • language attacks

  • cross-site request attacks

  • hijacking attacks

  • injection attacks

Explanation

Question 30 of 39

1

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads, what type attack is being performed?

Select one of the following:

  • ad squatting

  • clickjacking

  • malvertising

  • ad spoofing

Explanation

Question 31 of 39

1

When an attack is designed to prevent authorized users from accessing a system, it is called what kind of attack?

Select one of the following:

  • MITM

  • spoofing

  • denial of service

  • blocking

Explanation

Question 32 of 39

1

When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

Select one of the following:

  • HTTP

  • NSDB

  • URNS

  • DNS

Explanation

Question 33 of 39

1

Where are MAC addresses stored for future reference?

Select one of the following:

  • MAC cache

  • Ethernet cache

  • ARP cache

  • NIC

Explanation

Question 34 of 39

1

Which of the following are considered to be interception attacks? (Choose all that apply.)

Select one or more of the following:

  • denial of service

  • amplification attack

  • man-in-the-middle

  • replay attacks

Explanation

Question 35 of 39

1

Which SQL injection statement example below could be used to discover the name of the table?

Select one of the following:

  • whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --

  • whatever' AND 1=(SELECT COUNT(*) FROM tabname); --

  • whatever; AND 1=(SELECT COUNT(*) FROM tabname); --

  • whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --

Explanation

Question 36 of 39

1

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

Select one of the following:

  • whatever AND email IS NULL; --

  • whatever; AND email IS NULL; --

  • whatever" AND email IS NULL; --

  • whatever' AND email IS NULL; --

Explanation

Question 37 of 39

1

Which type of attack below is similar to a passive man-in-the-middle attack?

Select one of the following:

  • replay

  • hijacking

  • denial

  • buffer overflow

Explanation

Question 38 of 39

1

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

Select one of the following:

  • IP spoofing

  • denial of service

  • DNS poisoning

  • smurf attack

Explanation

Question 39 of 39

1

XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.

Select one of the following:

  • True
  • False

Explanation