Filters
Question type

Study Flashcards

How is a network-based MITM attack executed?

Correct Answer

verifed

verified

A network-based MITM attack involves a t...

View Answer

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,what type attack is being performed?


A) ad squatting
B) clickjacking
C) malvertising
D) ad spoofing

Correct Answer

verifed

verified

What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?


A) pointer hack
B) DNS spoofing
C) clickjacking
D) domain hijacking

Correct Answer

verifed

verified

An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:


A) Session replay
B) Session spoofing
C) Session hijacking
D) Session blocking

Correct Answer

verifed

verified

C

What criteria must be met for an XXS attack to occur on a specific website?


A) The website must accept user input while validating it and use that input in a response.
B) The website must accept user input without validating it and use that input in a response.
C) The website must not accept user input without validating it and use that input in a response.
D) The website must accept user input while validating it and omit that input in a response.

Correct Answer

verifed

verified

XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.

Correct Answer

verifed

verified

How does a cross-site request forgery (XSRF)attack work?

Correct Answer

verifed

verified

In a cross-site request forgery (XSRF)at...

View Answer

A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.

Correct Answer

verifed

verified

What are zero-day attacks?

Correct Answer

verifed

verified

Zero day attacks are...

View Answer

The exchange of information among DNS servers regarding configured zones is known as:


A) resource request
B) zone sharing
C) zone transfer
D) zone removal

Correct Answer

verifed

verified

How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?


A) DNS poisoning
B) Phishing
C) DNS marking
D) DNS overloading

Correct Answer

verifed

verified

Which SQL injection statement example below could be used to discover the name of the table?


A) whatever%20 AND 1=(SELECT COUNT(*) FROM tabname) ;--
B) whatever' AND 1=(SELECT COUNT(*) FROM tabname) ;--
C) whatever;AND 1=(SELECT COUNT(*) FROM tabname) ;--
D) whatever%;AND 1=(SELECT COUNT(*) FROM tabname) ;--

Correct Answer

verifed

verified

What directory are the host tables found in the /etc/ directory in UNIX,Linux,and macOS on a Windows system?

Correct Answer

verifed

verified

They are found in th...

View Answer

Which type of attack below is similar to a passive man-in-the-middle attack?


A) replay
B) hijacking
C) denial
D) buffer overflow

Correct Answer

verifed

verified

A

Securing web applications is easier than protecting other systems.

Correct Answer

verifed

verified

False

JavaScript cannot create separate stand-alone applications.

Correct Answer

verifed

verified

The return address is the only element that can be altered in a buffer overflow attack.

Correct Answer

verifed

verified

Traditional network security devices can block traditional network attacks,but they cannot always block web application attacks.

Correct Answer

verifed

verified

A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.

Correct Answer

verifed

verified

When TCP/IP was developed,the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:


A) HTTP
B) NSDB
C) URNS
D) DNS

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer