Exam 3: Application and Networking-Based Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions. -​Another name for locally shared object (LSO)

(Multiple Choice)
4.9/5
(39)

What are zero-day attacks?​

(Essay)
4.9/5
(36)

Match the following terms to the appropriate definitions. -​Part of the TCP/IP protocol for determining the MAC address based on the IP address.

(Multiple Choice)
4.8/5
(41)

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

(Multiple Choice)
4.9/5
(37)

Match the following terms to the appropriate definitions. -An attack that corrupts the ARP cache​

(Multiple Choice)
4.9/5
(33)

Match the following terms to the appropriate definitions. -Injecting and executing commands to execute on a server​

(Multiple Choice)
4.8/5
(29)

How does ARP poisoning take advantage of the use of ARP?​

(Essay)
4.8/5
(39)

Match the following terms to the appropriate definitions. -​A form of verification used when accessing a secure web application

(Multiple Choice)
4.8/5
(42)

Select below the string of characters that can be used to traverse up one directory level from the root directory:

(Multiple Choice)
4.8/5
(44)

Match the following terms to the appropriate definitions. -​An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.

(Multiple Choice)
4.9/5
(38)

What language below is for the transport and storage of data, with the focus on what the data is?

(Multiple Choice)
4.9/5
(35)

A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.

(Short Answer)
4.8/5
(33)

XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​

(True/False)
4.9/5
(36)

A TCP/IP communication begins with a control message, known as a ________________, to initialize the connection.​ Match the following terms to the appropriate definitions.​ a.​Address Resolution Protocol (ARP) b.ARP Poisoning​ c.​Buffer overflow attack d.Command injection​ e.​Cross-site scripting (XSS)

(Short Answer)
4.9/5
(37)

Ethernet LAN networks utilize the physical _________________ address to send packets.​

(Short Answer)
4.8/5
(40)

Explain the HTTP header referrer attack.

(Essay)
4.9/5
(45)

What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?

(Multiple Choice)
4.7/5
(43)

When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

(Multiple Choice)
4.8/5
(35)

A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?

(Multiple Choice)
4.8/5
(23)

Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.

(True/False)
4.8/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)