Exam 5: Networking and Server Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

(Multiple Choice)
4.9/5
(43)

What language below is used to view and manipulate data that is stored in a relational database?

(Multiple Choice)
4.7/5
(30)

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

(True/False)
4.9/5
(32)

What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

(Multiple Choice)
4.7/5
(31)

What type of additional attack does ARP spoofing rely on?

(Multiple Choice)
5.0/5
(45)

What is the basis for domain name resolution of names-to-IP addresses?

(Essay)
4.8/5
(34)

What type of attack is being performed when multiple computers overwhelm a system with fake requests?

(Multiple Choice)
4.7/5
(37)

What type of privileges to access hardware and software resources are granted to users or devices?

(Multiple Choice)
4.8/5
(27)

On a compromised computer,you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts.What type of exploit has occurred?

(Multiple Choice)
4.9/5
(41)

What are some of the typical server attacks used by attackers?

(Essay)
4.8/5
(32)

What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

(Multiple Choice)
4.7/5
(38)

What type of attack intercepts communication between parties to steal or manipulate the data?

(Multiple Choice)
4.8/5
(41)

What two locations can be a target for DNS poisoning? (Choose all that apply. )

(Multiple Choice)
4.8/5
(38)

When an attack is designed to prevent authorized users from accessing a system,it is called what kind of attack?

(Multiple Choice)
5.0/5
(41)

How does a buffer overflow attack occur?

(Essay)
4.8/5
(32)

Which of the following are considered to be interception attacks? (Choose all that apply. )

(Multiple Choice)
4.8/5
(40)

Explain how an attacker can use privilege escalation to gain access to a resources that are restricted?

(Essay)
4.9/5
(40)

Choose the SQL injection statement example below that could be used to find specific users:

(Multiple Choice)
4.9/5
(38)

An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

(Multiple Choice)
4.8/5
(33)

How does a cross-site scripting (XSS)attack work?

(Essay)
4.8/5
(31)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)