Exam 5: Networking and Server Attacks
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Basic Cryptography50 Questions
Exam 4: Advanced Cryptography and PKI50 Questions
Exam 5: Networking and Server Attacks50 Questions
Exam 6: Network Security Devices, Design, and Technology50 Questions
Exam 7: Administering a Secure Network50 Questions
Exam 8: Wireless Network Security50 Questions
Exam 9: Client and Application Security50 Questions
Exam 10: Mobile and Embedded Device Security50 Questions
Exam 11: Authentication and Account Management50 Questions
Exam 12: Access Management50 Questions
Exam 13: Vulnerability Assessment and Data Security50 Questions
Exam 14: Business Continuity50 Questions
Exam 15: Risk Mitigation50 Questions
Select questions type
Which type of attack below is similar to a passive man-in-the-middle attack?
Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
A
Securing web applications is easier than protecting other systems.
Free
(True/False)
4.7/5
(40)
Correct Answer:
False
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
C
Which SQL injection statement example below could be used to discover the name of the table?
(Multiple Choice)
4.9/5
(24)
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
(Multiple Choice)
4.9/5
(42)
When TCP/IP was developed,the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
(Multiple Choice)
4.8/5
(34)
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
(True/False)
4.8/5
(32)
What directory are the host tables found in the /etc/ directory in UNIX,Linux,and macOS on a Windows system?
(Essay)
4.9/5
(43)
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?
(Multiple Choice)
4.9/5
(37)
Traditional network security devices can block traditional network attacks,but they cannot always block web application attacks.
(True/False)
4.8/5
(43)
A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.
(True/False)
4.9/5
(51)
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,what type attack is being performed?
(Multiple Choice)
4.9/5
(39)
What criteria must be met for an XXS attack to occur on a specific website?
(Multiple Choice)
4.9/5
(38)
The exchange of information among DNS servers regarding configured zones is known as:
(Multiple Choice)
4.8/5
(37)
XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.
(True/False)
4.8/5
(38)
The return address is the only element that can be altered in a buffer overflow attack.
(True/False)
5.0/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)