Ch 12 - Attack & Defense Flashcards
What protocol is used for a Smurf attack?
A. DNS
B. ICMP
C. TCP
D. SMTP
B.
ICMP
If you were to see ’ or 1=1; in a packet capture, what would you expect was happening?
A. Cross‐site scripting
B. Command injection
C. SQL injection
D. XML external entity injection
C.
SQL injection
Which protocol is commonly used for amplification attacks?
A. TCP
B. SMTP
C. DNS
D. XML
C.
DNS
What is the purpose of a SYN flood?
A. Fill up connection buffers in the operating system
B. Fill up connection buffers in the web server
C. Fill up connection buffers at the Application layer
D. Fill up connection buffers for UDP
A.
Fill up connection buffers in the operating system
How does a slowloris attack work?
A. Holds open connection buffers at the operating system
B. Holds open connection buffers at the web server
C. Holds open connection buffers at the Application layer
D. Holds open connection buffers for UDP
B.
Holds open connection buffers at the web server
What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable that has been allocated space for 8 bytes?
A. Heap spraying
B. SQL injection
C. Buffer overflow
D. Slowloris attack
C.
Buffer overflow
What is the target of a cross‐site scripting attack?
A. Web server
B. Database server
C. Third‐party server
D. User
D.
User
If you were to see the following in a packet capture, what would you think was happening?
<!ENTITY xxe SYSTEM “file:///etc/passwd”>]>
A. Cross‐site scripting
B. SQL injection
C. Command injection
D. XML external entity injection
D.
XML external entity injection
What protection could be used to prevent an SQL injection attack?
A. Buffer overflows
B. Input validation
C. XML filtering
D. Lateral movement
B.
Input validation
What security element would be a crucial part of a defense‐in‐depth network design?
A. Firewall
B. SIEM
C. Web application firewall
D. Log management system
A.
Firewall
What does a defense‐in‐breadth approach add?
A. Consideration for a broader range of attacks
B. Protection against SQL injection
C. Buffer overflow protection
D. Heap spraying protection
A.
Consideration for a broader range of attacks
What attack injects code into dynamically allocated memory?
A. Buffer overflow
B. Cross‐site scripting
C. Heap spraying
D. Slowloris
C.
Heap spraying
If you were to see the following in a packet capture, what attack would you expect is happening?
%3Cscript%3Ealert(‘wubble’);%3C/script%3E
A. SQL injection
B. Command injection
C. Cross‐site scripting
D. Buffer overflow
C.
Cross‐site scripting
What has been done to the following string?
%3Cscript%3Ealert(‘wubble’);%3C/script%3E
A. Base64 encoding
B. URL encoding
C. Encryption
D. Cryptographic hashing
B.
URL encoding
What technique does a slow read attack use?
A. Small HTTP header requests
B. Small HTTP body requests
C. Small HTTP POST requests
D. Small file retrieval requests
D.
Small file retrieval requests