Exam 5: Networking and Server Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Where are MAC addresses stored for future reference?

(Multiple Choice)
4.8/5
(32)

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?

(Multiple Choice)
4.8/5
(45)

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

(Multiple Choice)
4.8/5
(31)

What specific ways can a session token be transmitted? (Choose all that apply. )

(Multiple Choice)
4.7/5
(41)

In an integer overflow attack,an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

(True/False)
4.7/5
(33)

What technology expands the normal capabilities of a web browser for a specific webpage?

(Multiple Choice)
4.9/5
(30)

What are the two types of cross-site attacks? (Choose all that apply. )

(Multiple Choice)
4.7/5
(30)

What type of web server application attacks introduce new input to exploit a vulnerability?

(Multiple Choice)
4.7/5
(28)

The malicious content of an XSS URL is confined to material posted on a website

(True/False)
4.8/5
(38)

If a MAC address is permanently "burned" into a network interface card,how can an attacker change the MAC address to perform an ARP poisoning attack?

(Essay)
4.9/5
(29)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)