Exam 3: Application and Networking-Based Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because of the minor role it plays, DNS is never the focus of attacks.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.

Free
(True/False)
4.7/5
(38)
Correct Answer:
Verified

False

HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

D

In a drive-by download attack, provide an example of how an attacker might avoid visual detection.​

(Essay)
5.0/5
(36)

Choose the SQL injection statement example below that could be used to find specific users:

(Multiple Choice)
4.8/5
(28)

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​

(Multiple Choice)
4.8/5
(26)

Match the following terms to the appropriate definitions. -​An attack that injects scripts into a web application server to direct attacks at clients.

(Multiple Choice)
4.8/5
(39)

Describe the two types of privilege escalation.

(Essay)
4.8/5
(30)

What language below is designed to display data, with a primary focus on how the data looks?

(Multiple Choice)
4.9/5
(28)

A web browser makes a request for a web page using the ________________.

(Short Answer)
4.9/5
(38)

How does a SYN flood attack work?​

(Essay)
4.8/5
(29)

Match the following terms to the appropriate definitions. -​An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.

(Multiple Choice)
4.8/5
(48)

Match the following terms to the appropriate definitions. -An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer​

(Multiple Choice)
4.9/5
(38)

List three of the most common Web application attacks.

(Essay)
4.9/5
(32)

Match the following terms to the appropriate definitions. -​An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.

(Multiple Choice)
4.7/5
(37)

How does a cross-site scripting (XSS) attack work?

(Essay)
4.9/5
(33)

To what specific directory are users generally restricted to on a web server?

(Multiple Choice)
4.7/5
(37)

Which SQL injection statement can be used to erase an entire database table?

(Multiple Choice)
4.7/5
(35)

Attacks that take place against web based services are considered to be what type of attack?

(Multiple Choice)
4.8/5
(34)

What is the goal of a directory traversal attack?​

(Essay)
4.9/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)