Deck 3: Application and Networking-Based Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: Application and Networking-Based Attacks
1
Because of the minor role it plays, DNS is never the focus of attacks.
False
2
Which SQL injection statement example below could be used to discover the name of the table?
A)whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B)whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C)whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D)whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
A)whatever%20 AND 1=(SELECT COUNT(*) FROM tabname); --
B)whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
C)whatever; AND 1=(SELECT COUNT(*) FROM tabname); --
D)whatever%; AND 1=(SELECT COUNT(*) FROM tabname); --
B
3
What language below is used to view and manipulate data that is stored in a relational database?
A)C
B)DQL
C)SQL
D)ISL
A)C
B)DQL
C)SQL
D)ISL
C
4
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which type of attack below is similar to a passive man-in-the-middle attack?
A)replay
B)hijacking
C)denial
D)buffer overflow
A)replay
B)hijacking
C)denial
D)buffer overflow
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Choose the SQL injection statement example below that could be used to find specific users:
A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
A)whatever' OR full_name = '%Mia%'
B)whatever' OR full_name IS '%Mia%'
C)whatever' OR full_name LIKE '%Mia%'
D)whatever' OR full_name equals '%Mia%'
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below?
A)/var/www
B)C:\Inetpub\ wwwroot
C)/var/html
D)C:\wwwroot
A)/var/www
B)C:\Inetpub\ wwwroot
C)/var/html
D)C:\wwwroot
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?
A)Privilege escalation
B)DNS cache poisoning
C)ARP poisoning
D)Man-in-the-middle
A)Privilege escalation
B)DNS cache poisoning
C)ARP poisoning
D)Man-in-the-middle
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?
A)blocks
B)marks
C)taps
D)tags
A)blocks
B)marks
C)taps
D)tags
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To what specific directory are users generally restricted to on a web server?
A)top
B)base
C)root
D)tap
A)top
B)base
C)root
D)tap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted?
A)HTTP header
B)HTML header
C)XML header
D)SSL header
A)HTTP header
B)HTML header
C)XML header
D)SSL header
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Attacks that take place against web based services are considered to be what type of attack?
A)client-side
B)hybrid
C)server-side
D)relationship
A)client-side
B)hybrid
C)server-side
D)relationship
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?
A)buffer overflow
B)drive-by-download
C)denial of service
D)stack underflow
A)buffer overflow
B)drive-by-download
C)denial of service
D)stack underflow
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database?
A)whatever AND email IS NULL; --
B)whatever; AND email IS NULL; --
C)whatever" AND email IS NULL; --
D)whatever' AND email IS NULL; --
A)whatever AND email IS NULL; --
B)whatever; AND email IS NULL; --
C)whatever" AND email IS NULL; --
D)whatever' AND email IS NULL; --
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device?
A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
A)DNS poisoning
B)Phishing
C)DNS marking
D)DNS overloading
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The exchange of information among DNS servers regarding configured zones is known as:
A)resource request
B)zone disarticulation
C)zone transfer
D)zone removal
A)resource request
B)zone disarticulation
C)zone transfer
D)zone removal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Which SQL injection statement can be used to erase an entire database table?
A)whatever'; DROP TABLE members; --
B)whatever'; DELETE TABLE members; --
C)whatever'; UPDATE TABLE members; --
D)whatever'; RENAME TABLE members; --
A)whatever'; DROP TABLE members; --
B)whatever'; DELETE TABLE members; --
C)whatever'; UPDATE TABLE members; --
D)whatever'; RENAME TABLE members; --
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What language below is for the transport and storage of data, with the focus on what the data is?
A)XML
B)HTML
C)SGML
D)SML
A)XML
B)HTML
C)SGML
D)SML
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What language below is designed to display data, with a primary focus on how the data looks?
A)XML
B)HTML
C)SGML
D)ISL
A)XML
B)HTML
C)SGML
D)ISL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
A form of verification used when accessing a secure web application
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
A form of verification used when accessing a secure web application
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service:
A)HTTP
B)NSDB
C)URNS
D)DNS
A)HTTP
B)NSDB
C)URNS
D)DNS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Injecting and executing commands to execute on a server
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Injecting and executing commands to execute on a server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Part of the TCP/IP protocol for determining the MAC address based on the IP address.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Part of the TCP/IP protocol for determining the MAC address based on the IP address.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Another name for locally shared object (LSO)
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
Another name for locally shared object (LSO)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A web browser makes a request for a web page using the ________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Ethernet LAN networks utilize the physical _________________ address to send packets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Select below the string of characters that can be used to traverse up one directory level from the root directory:
A);/
B)./
C)%20/
D)../
A);/
B)./
C)%20/
D)../
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that corrupts the ARP cache
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that corrupts the ARP cache
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The predecessor to today's Internet was a network known as ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match the following terms to the appropriate definitions.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that injects scripts into a web application server to direct attacks at clients.
a. Address Resolution Protocol (ARP)
b. ARP Poisoning
c. Buffer overflow attack
d. Command injection
e. Cross-site scripting (XSS)
f. DNS poisoning
g. Flash cookie
h. Ping flood
An attack that injects scripts into a web application server to direct attacks at clients.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) ____________________ cookie is stored in Random Access Memory (RAM), instead of on the hard drive, and only lasts for the duration of visiting the Web site.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
A)Session replay
B)Session spoofing
C)Session hijacking
D)Session blocking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
A TCP/IP communication begins with a control message, known as a ________________, to initialize the connection.
Match the following terms to the appropriate definitions.
a.Address Resolution Protocol (ARP)
b.ARP Poisoning
c.Buffer overflow attack
d.Command injection
e.Cross-site scripting (XSS)
Match the following terms to the appropriate definitions.
a.Address Resolution Protocol (ARP)
b.ARP Poisoning
c.Buffer overflow attack
d.Command injection
e.Cross-site scripting (XSS)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the goal of a directory traversal attack?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a cookie, and how is it used?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
In a drive-by download attack, provide an example of how an attacker might avoid visual detection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How does a cross-site scripting (XSS) attack work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List three of the most common Web application attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What are zero-day attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Explain the HTTP header referrer attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe the two types of privilege escalation.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does ARP poisoning take advantage of the use of ARP?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
How does a SYN flood attack work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck