Deck 3: Application and Network Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 3: Application and Network Attacks
1
The SQL injection statement ____ erases the database table.
A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --
A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --
A
2
The SQL injection statement ____ discovers the name of a table.
A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C) whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C) whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D) whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
B
3
Users who access a Web server are usually restricted to the ____ directory.
A) top
B) base
C) root
D) tap
A) top
B) base
C) root
D) tap
C
4
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is a language used to view and manipulate data that is stored in a relational database.
A) C
B) DQL
C) SQL
D) ISL
A) C
B) DQL
C) SQL
D) ISL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A client-side attack that results in a user's computer becoming compromised just by viewing a Web page and not even clicking any content is known as a ____.
A) buffer overflow
B) drive-by-download
C) denial of service
D) stack underflow
A) buffer overflow
B) drive-by-download
C) denial of service
D) stack underflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is designed to display data, with the primary focus on how the data looks.
A) XML
B) HTML
C) SGML
D) ISL
A) XML
B) HTML
C) SGML
D) ISL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is for the transport and storage of data, with the focus on what the data is.
A) XML
B) HTML
C) SGML
D) SML
A) XML
B) HTML
C) SGML
D) SML
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The "omnipresence" of access from any computer with only an Internet connection and a Web browser has made Web applications an essential element of organizations today.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The expression ____ up one directory level.
A) ;/traverses
B)./traverses
C) %20/traverses
D)../ traverses
A) ;/traverses
B)./traverses
C) %20/traverses
D)../ traverses
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
For a Web server's Linux system, the default root directory is typically ____.
A) /var/www
B) C:\inetpub\wwwroot
C) /var/root
D) /home/root
A) /var/www
B) C:\inetpub\wwwroot
C) /var/root
D) /home/root
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The SQL injection statement ____ determines the names of different fields in a database.
A) whatever AND email IS NULL; --
B) whatever; AND email IS NULL; --
C) whatever" AND email IS NULL; --
D) whatever' AND email IS NULL; --
A) whatever AND email IS NULL; --
B) whatever; AND email IS NULL; --
C) whatever" AND email IS NULL; --
D) whatever' AND email IS NULL; --
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
HTML is a markup language that uses specific ____ embedded in brackets.
A) blocks
B) marks
C) taps
D) tags
A) blocks
B) marks
C) taps
D) tags
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Because of the minor role it plays, DNS is never the focus of attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ is part of an HTTP packet that is composed of fields that contain the different characteristics of the data being transmitted.
A) HTTP header
B) HTML header
C) XML header
D) SSL header
A) HTTP header
B) HTML header
C) XML header
D) SSL header
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The SQL injection statement ____ finds specific users.
A) whatever' OR full_name = '%Mia%'
B) whatever' OR full_name IS '%Mia%'
C) whatever' OR full_name LIKE '%Mia%'
D) whatever' OR full_name equals '%Mia%'
A) whatever' OR full_name = '%Mia%'
B) whatever' OR full_name IS '%Mia%'
C) whatever' OR full_name LIKE '%Mia%'
D) whatever' OR full_name equals '%Mia%'
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The default root directory of the Microsoft Internet Information Services (IIS) Web server is ____.
A) /var/www
B) C:\Inetpub\ wwwroot
C) /var/html
D) /etc/var/www
A) /var/www
B) C:\Inetpub\ wwwroot
C) /var/html
D) /etc/var/www
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Web application attacks are considered ____ attacks.
A) client-side
B) hybrid
C) server-side
D) relationship
A) client-side
B) hybrid
C) server-side
D) relationship
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Why would you want to limit access to the root directory of a Web server?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
When TCP/IP was developed, the host table concept was expanded to a hierarchical name system for matching computer names and numbers known as the ____.
A) HTTP
B) NSDB
C) URNS
D) DNS
A) HTTP
B) NSDB
C) URNS
D) DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The ____________________ directory is a specific directory on a Web server's file system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
List three of the most common Web application attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Describe how to harden a Web server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
____ substitutes DNS addresses so that the computer is automatically redirected to another device.
A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading
A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A ____ attack is similar to a passive man-in-the-middle attack.
A) replay
B) hijacking
C) denial
D) buffer overflow
A) replay
B) hijacking
C) denial
D) buffer overflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe a cross-site scripting (XSS) attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
All Web traffic is based on the ____________________ protocol.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ is an attack in which an attacker attempts to impersonate the user by using his session token.
A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
When DNS servers exchange information among themselves it is known as a ____.
A) resource request
B) zone disarticulation
C) zone transfer
D) zone removal
A) resource request
B) zone disarticulation
C) zone transfer
D) zone removal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The predecessor to today's Internet was a network known as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What does a user need to perform a directory traversal attack?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Describe a drive-by-download attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____________________ is a method for adding annotations to the text so that the additions can be distinguished from the text itself.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
A) DNS spooking
B) DNS poisoning
C) DNS bonding
D) DNS blacklisting
A) DNS spooking
B) DNS poisoning
C) DNS bonding
D) DNS blacklisting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Explain the HTTP header referrer attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the differences between XML and HTML.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the two types of privilege escalation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Explain the approach attackers use against DNS servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck