Deck 5: Networking and Server Attacks

ملء الشاشة (f)
exit full mode
سؤال
The return address is the only element that can be altered in a buffer overflow attack.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The malicious content of an XSS URL is confined to material posted on a website
سؤال
What type of additional attack does ARP spoofing rely on?

A)DNS Poisoning
B)replay
C)MITB
D)MAC spoofing
سؤال
What type of privileges to access hardware and software resources are granted to users or devices?

A)access privileges
B)user rights
C)access rights
D)permissions
سؤال
Traditional network security devices can block traditional network attacks,but they cannot always block web application attacks.
سؤال
JavaScript cannot create separate stand-alone applications.
سؤال
What are the two types of cross-site attacks? (Choose all that apply. )

A)cross-site input attacks
B)cross-site scripting attacks
C)cross-site request forgery attacks
D)cross-site flood attacks
سؤال
What two locations can be a target for DNS poisoning? (Choose all that apply. )

A)local host table
B)external DNS server
C)local database table
D)directory server
سؤال
Securing web applications is easier than protecting other systems.
سؤال
What language below is used to view and manipulate data that is stored in a relational database?

A)C
B)DQL
C)SQL
D)ISL
سؤال
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

A)IP spoofing
B)denial of service
C)DNS Poisoning
D)smurf attack
سؤال
What type of attack intercepts communication between parties to steal or manipulate the data?

A)replay
B)MAC spoofing
C)man-in-the-browser
D)ARP poisoning
سؤال
XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.
سؤال
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

A)DNS
B)ARP
C)TCP
D)UDP
سؤال
In an integer overflow attack,an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.
سؤال
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
سؤال
A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
سؤال
A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.
سؤال
An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

A)DNS amplification attack
B)IP spoofing
C)smurf attack
D)SYN flood attack
سؤال
When an attack is designed to prevent authorized users from accessing a system,it is called what kind of attack?

A)MITM
B)spoofing
C)denial of service
D)blocking
سؤال
When TCP/IP was developed,the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

A)HTTP
B)NSDB
C)URNS
D)DNS
سؤال
What technology expands the normal capabilities of a web browser for a specific webpage?

A)extensions
B)add-ons
C)plug-ins
D)Java applets
سؤال
Which of the following are considered to be interception attacks? (Choose all that apply. )

A)denial of service
B)amplification attack
C)man-in-the-middle
D)replay attacks
سؤال
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?

A)spoofing
B)URL hijacking
C)Web squatting
D)typo hijacking
سؤال
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,what type attack is being performed?

A)ad squatting
B)clickjacking
C)malvertising
D)ad spoofing
سؤال
Which type of attack below is similar to a passive man-in-the-middle attack?

A)replay
B)hijacking
C)denial
D)buffer overflow
سؤال
Choose the SQL injection statement example below that could be used to find specific users:

A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
سؤال
Which SQL injection statement example below could be used to discover the name of the table?

A)whatever%20 AND 1=(SELECT COUNT(*)FROM tabname);--
B)whatever' AND 1=(SELECT COUNT(*)FROM tabname);--
C)whatever;AND 1=(SELECT COUNT(*)FROM tabname);--
D)whatever%;AND 1=(SELECT COUNT(*)FROM tabname);--
سؤال
What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

A)ARP poisoning
B)man-in-the-middle
C)denial of service
D)DNS poisoning
سؤال
What specific ways can a session token be transmitted? (Choose all that apply. )

A)In the URL.
B)In the trailer of a frame.
C)In the header of a packet.
D)In the header of the HTTP requisition.
سؤال
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

A)pointer hack
B)DNS spoofing
C)clickjacking
D)domain hijacking
سؤال
What type of attack is being performed when multiple computers overwhelm a system with fake requests?

A)DDoS
B)DoS
C)SYN flood
D)replay attacks
سؤال
The exchange of information among DNS servers regarding configured zones is known as:

A)resource request
B)zone sharing
C)zone transfer
D)zone removal
سؤال
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
سؤال
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
سؤال
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

A)whatever AND email IS NULL;--
B)whatever;AND email IS NULL;--
C)whatever" AND email IS NULL;--
D)whatever' AND email IS NULL;--
سؤال
Where are MAC addresses stored for future reference?

A)MAC cache
B)Ethernet cache
C)ARP cache
D)NIC
سؤال
What criteria must be met for an XXS attack to occur on a specific website?

A)The website must accept user input while validating it and use that input in a response.
B)The website must accept user input without validating it and use that input in a response.
C)The website must not accept user input without validating it and use that input in a response.
D)The website must accept user input while validating it and omit that input in a response.
سؤال
What type of web server application attacks introduce new input to exploit a vulnerability?

A)language attacks
B)cross-site request attacks
C)hijacking attacks
D)injection attacks
سؤال
On a compromised computer,you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts.What type of exploit has occurred?

A)Privilege escalation
B)DNS cache poisoning
C)ARP poisoning
D)Man-in-the-middle
سؤال
What are zero-day attacks?
سؤال
How does a buffer overflow attack occur?
سؤال
What directory are the host tables found in the /etc/ directory in UNIX,Linux,and macOS on a Windows system?
سؤال
How does a cross-site request forgery (XSRF)attack work?
سؤال
If a MAC address is permanently "burned" into a network interface card,how can an attacker change the MAC address to perform an ARP poisoning attack?
سؤال
How is a network-based MITM attack executed?
سؤال
How does a cross-site scripting (XSS)attack work?
سؤال
What are some of the typical server attacks used by attackers?
سؤال
Explain how an attacker can use privilege escalation to gain access to a resources that are restricted?
سؤال
What is the basis for domain name resolution of names-to-IP addresses?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Networking and Server Attacks
1
The return address is the only element that can be altered in a buffer overflow attack.
False
2
The malicious content of an XSS URL is confined to material posted on a website
False
3
What type of additional attack does ARP spoofing rely on?

A)DNS Poisoning
B)replay
C)MITB
D)MAC spoofing
D
4
What type of privileges to access hardware and software resources are granted to users or devices?

A)access privileges
B)user rights
C)access rights
D)permissions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Traditional network security devices can block traditional network attacks,but they cannot always block web application attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
JavaScript cannot create separate stand-alone applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What are the two types of cross-site attacks? (Choose all that apply. )

A)cross-site input attacks
B)cross-site scripting attacks
C)cross-site request forgery attacks
D)cross-site flood attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What two locations can be a target for DNS poisoning? (Choose all that apply. )

A)local host table
B)external DNS server
C)local database table
D)directory server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Securing web applications is easier than protecting other systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What language below is used to view and manipulate data that is stored in a relational database?

A)C
B)DQL
C)SQL
D)ISL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?

A)IP spoofing
B)denial of service
C)DNS Poisoning
D)smurf attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What type of attack intercepts communication between parties to steal or manipulate the data?

A)replay
B)MAC spoofing
C)man-in-the-browser
D)ARP poisoning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
XSS is like a phishing attack but without needing to trick the user into visiting a malicious website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
What protocol can be used by a host on a network to find the MAC address of another device based on an IP address?

A)DNS
B)ARP
C)TCP
D)UDP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
In an integer overflow attack,an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A DNS amplification attack floods an unsuspecting victim by redirecting valid responses to it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A SYN flood attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
An attack that takes advantage of the procedures for initiating a session is known as what type of attack?

A)DNS amplification attack
B)IP spoofing
C)smurf attack
D)SYN flood attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
When an attack is designed to prevent authorized users from accessing a system,it is called what kind of attack?

A)MITM
B)spoofing
C)denial of service
D)blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
When TCP/IP was developed,the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:

A)HTTP
B)NSDB
C)URNS
D)DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What technology expands the normal capabilities of a web browser for a specific webpage?

A)extensions
B)add-ons
C)plug-ins
D)Java applets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following are considered to be interception attacks? (Choose all that apply. )

A)denial of service
B)amplification attack
C)man-in-the-middle
D)replay attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?

A)spoofing
B)URL hijacking
C)Web squatting
D)typo hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,what type attack is being performed?

A)ad squatting
B)clickjacking
C)malvertising
D)ad spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which type of attack below is similar to a passive man-in-the-middle attack?

A)replay
B)hijacking
C)denial
D)buffer overflow
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Choose the SQL injection statement example below that could be used to find specific users:

A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which SQL injection statement example below could be used to discover the name of the table?

A)whatever%20 AND 1=(SELECT COUNT(*)FROM tabname);--
B)whatever' AND 1=(SELECT COUNT(*)FROM tabname);--
C)whatever;AND 1=(SELECT COUNT(*)FROM tabname);--
D)whatever%;AND 1=(SELECT COUNT(*)FROM tabname);--
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What type of an attack is being executed if an attacker substituted an invalid MAC address for the network gateway so no users can access external networks?

A)ARP poisoning
B)man-in-the-middle
C)denial of service
D)DNS poisoning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What specific ways can a session token be transmitted? (Choose all that apply. )

A)In the URL.
B)In the trailer of a frame.
C)In the header of a packet.
D)In the header of the HTTP requisition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
What attack occurs when a domain pointer that links a domain name to a specific web server is changed by a threat actor?

A)pointer hack
B)DNS spoofing
C)clickjacking
D)domain hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What type of attack is being performed when multiple computers overwhelm a system with fake requests?

A)DDoS
B)DoS
C)SYN flood
D)replay attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
The exchange of information among DNS servers regarding configured zones is known as:

A)resource request
B)zone sharing
C)zone transfer
D)zone removal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:

A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?

A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?

A)whatever AND email IS NULL;--
B)whatever;AND email IS NULL;--
C)whatever" AND email IS NULL;--
D)whatever' AND email IS NULL;--
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Where are MAC addresses stored for future reference?

A)MAC cache
B)Ethernet cache
C)ARP cache
D)NIC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
What criteria must be met for an XXS attack to occur on a specific website?

A)The website must accept user input while validating it and use that input in a response.
B)The website must accept user input without validating it and use that input in a response.
C)The website must not accept user input without validating it and use that input in a response.
D)The website must accept user input while validating it and omit that input in a response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of web server application attacks introduce new input to exploit a vulnerability?

A)language attacks
B)cross-site request attacks
C)hijacking attacks
D)injection attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
On a compromised computer,you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts.What type of exploit has occurred?

A)Privilege escalation
B)DNS cache poisoning
C)ARP poisoning
D)Man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are zero-day attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
How does a buffer overflow attack occur?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What directory are the host tables found in the /etc/ directory in UNIX,Linux,and macOS on a Windows system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How does a cross-site request forgery (XSRF)attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
If a MAC address is permanently "burned" into a network interface card,how can an attacker change the MAC address to perform an ARP poisoning attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
How is a network-based MITM attack executed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How does a cross-site scripting (XSS)attack work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are some of the typical server attacks used by attackers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain how an attacker can use privilege escalation to gain access to a resources that are restricted?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is the basis for domain name resolution of names-to-IP addresses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.