Exam 5: Networking and Server Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of attack below is similar to a passive man-in-the-middle attack?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

A

Securing web applications is easier than protecting other systems.

Free
(True/False)
4.7/5
(40)
Correct Answer:
Verified

False

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

C

How is a network-based MITM attack executed?

(Essay)
4.8/5
(39)

Which SQL injection statement example below could be used to discover the name of the table?

(Multiple Choice)
4.9/5
(24)

What are zero-day attacks?

(Essay)
4.8/5
(40)

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

(Multiple Choice)
4.9/5
(42)

When TCP/IP was developed,the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

(Multiple Choice)
4.8/5
(34)

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.

(True/False)
4.8/5
(32)

How does a cross-site request forgery (XSRF)attack work?

(Essay)
4.7/5
(27)

What directory are the host tables found in the /etc/ directory in UNIX,Linux,and macOS on a Windows system?

(Essay)
4.9/5
(43)

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

(Multiple Choice)
4.9/5
(37)

JavaScript cannot create separate stand-alone applications.

(True/False)
4.8/5
(33)

Traditional network security devices can block traditional network attacks,but they cannot always block web application attacks.

(True/False)
4.8/5
(43)

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.

(True/False)
4.9/5
(51)

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,what type attack is being performed?

(Multiple Choice)
4.9/5
(39)

What criteria must be met for an XXS attack to occur on a specific website?

(Multiple Choice)
4.9/5
(38)

The exchange of information among DNS servers regarding configured zones is known as:

(Multiple Choice)
4.8/5
(37)

XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.

(True/False)
4.8/5
(38)

The return address is the only element that can be altered in a buffer overflow attack.

(True/False)
5.0/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)