Exam 3: Application and Networking-Based Attacks
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions.
-Another name for locally shared object (LSO)
(Multiple Choice)
4.9/5
(39)
Match the following terms to the appropriate definitions.
-Part of the TCP/IP protocol for determining the MAC address based on the IP address.
(Multiple Choice)
4.8/5
(41)
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
(Multiple Choice)
4.9/5
(37)
Match the following terms to the appropriate definitions.
-An attack that corrupts the ARP cache
(Multiple Choice)
4.9/5
(33)
Match the following terms to the appropriate definitions.
-Injecting and executing commands to execute on a server
(Multiple Choice)
4.8/5
(29)
Match the following terms to the appropriate definitions.
-A form of verification used when accessing a secure web application
(Multiple Choice)
4.8/5
(42)
Select below the string of characters that can be used to traverse up one directory level from the root directory:
(Multiple Choice)
4.8/5
(44)
Match the following terms to the appropriate definitions.
-An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
(Multiple Choice)
4.9/5
(38)
What language below is for the transport and storage of data, with the focus on what the data is?
(Multiple Choice)
4.9/5
(35)
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
(Short Answer)
4.8/5
(33)
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.
(True/False)
4.9/5
(36)
A TCP/IP communication begins with a control message, known as a ________________, to initialize the connection.
Match the following terms to the appropriate definitions.
a.Address Resolution Protocol (ARP)
b.ARP Poisoning
c.Buffer overflow attack
d.Command injection
e.Cross-site scripting (XSS)
(Short Answer)
4.9/5
(37)
Ethernet LAN networks utilize the physical _________________ address to send packets.
(Short Answer)
4.8/5
(40)
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?
(Multiple Choice)
4.7/5
(43)
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
(Multiple Choice)
4.8/5
(35)
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?
(Multiple Choice)
4.8/5
(23)
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
(True/False)
4.8/5
(39)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)