10.2.14 Practice Questions Flashcards
Which of the following tasks is being described?
Sniff the traffic between the target computer and the server.
Monitor traffic with the goal of predicting the packet sequence numbers.
Desynchronize the current session.
Predict the session ID and take over the session.
Inject commands to target the server.
answer
Cookie hijacking
Application hijacking
Passive hijacking
Session hijacking
Session hijacking
Listen to exam instructions
Which of the following describes a session ID?
answer
The destination IP address of an encrypted packet sent from a server to a client.
A unique token that a server assigns for the duration of a client’s communications with the server.
The source IP address of an encrypted packet sent from a server to a client.
The symmetric key used to encrypt and decrypt communications between a client and a server.
A unique token that a server assigns for the duration of a client’s communications with the server.
Listen to exam instructions
Which of the following is characterized by an attacker using a sniffer to monitor traffic between a victim and a host?
answer
Session key
Passive hijacking
Session ID
Active hijacking
Passive hijacking
Jason, an attacker, has manipulated a client’s connection to disconnect the real client and allow the server to think that he is the authenticated user. Which of the following describes what he has done?
answer
Cross-site scripting
Active hijacking
Passive hijacking
Session sniffing
Active hijacking
Listen to exam instructions
Which of the following best describes the process of using prediction to gain session tokens in an Application level hijacking attack?
answer
Collect several session IDs that have been used before and then analyze them to determine a pattern.
Obtain a user’s HTTP cookies to collect session IDs embedded within the file to gain access to a session.
Convince the victim system that you are the server so you can hijack a session and collect sensitive information.
Review a user’s browsing history to enter a previously used URL to gain access to an open session.
Collect several session IDs that have been used before and then analyze them to determine a pattern.
An illustration of a series of packets captured with Wireshark, using a filter.
As the cybersecurity specialist for your company, you have used Wireshark to check for man-in-the-middle DHCP spoofing attacks using the bootp filter. After examining the results, what is your best assessment?
answer
A man-in-the-middle spoofing attack is possible due to the DHCP Offer packet captured from the hacker.
A man-in-the-middle spoofing attack is possible due to two DHCP ACK packets.
Two man-in-the-middle spoofing attacks were captured.
No man-in-the-middle spoofing attacks are currently present.
A man-in-the-middle spoofing attack is possible due to two DHCP ACK packets.
Which term describes the process of sniffing traffic between a user and server, then re-directing the traffic to the attacker’s machine, where malicious traffic can be forwarded to either the user or server?
answer
Cross-site scripting
DNS spoofing
Man-in-the-middle
Session hijacking
Man-in-the-middle
An illustration of a series of packets captured with Wireshark, using a filter.
While performing a penetration test, you captured a few HTTP POST packets using Wireshark. After examining the selected packet, which of the following concerns or recommendations will you include in your report?
answer
Keep-alive connections are being used.
Passwords are being sent in clear text.
The urgent pointer flag is set to 0.
The checksum is unverified.
Passwords are being sent in clear text.
Which of the following protocols is one of the most common methods used to protect packet information and defend against network attacks in VPNs?
answer
IPsec
ECC
SYN
BLE
IPsec
A penetration tester discovers a vulnerable application and is able to hijack a website’s URL hyperlink session ID. The penetration tester is able to intercept the session ID; when the vulnerable application sends the URL hyperlink to the website, the session IDs are embedded in the hyperlink. Which of the following types of session hijacking countermeasures is the penetration tester using?
answer
TCP/IP session hijacking
Man-in-the-middle attack
UDP session hijacking
Session fixation attack
Session fixation attack
Listen to exam instructions
Which of the following are protocols included in the IPsec architecture?
answer
IKE, AH, and ACK
SIP, AH, and ESP
IKE, AH, and ESP
SIP, AH, and ACK
IKE, AH, and ESP
Your network administrator has set up training for all the users regarding clicking on links in emails or instant messages. Which of the following is your network administrator attempting to prevent?
answer
DNS spoofing
Packet filtering
Packet sniffing
Session fixation
Session fixation