Ch 12 - Attack & Defense Flashcards

1
Q

What protocol is used for a Smurf attack?

A. DNS
B. ICMP
C. TCP
D. SMTP

A

B.
ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you were to see ’ or 1=1; in a packet capture, what would you expect was happening?

A. Cross‐site scripting
B. Command injection
C. SQL injection
D. XML external entity injection

A

C.
SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol is commonly used for amplification attacks?

A. TCP
B. SMTP
C. DNS
D. XML

A

C.
DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a SYN flood?

A. Fill up connection buffers in the operating system
B. Fill up connection buffers in the web server
C. Fill up connection buffers at the Application layer
D. Fill up connection buffers for UDP

A

A.
Fill up connection buffers in the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a slowloris attack work?

A. Holds open connection buffers at the operating system
B. Holds open connection buffers at the web server
C. Holds open connection buffers at the Application layer
D. Holds open connection buffers for UDP

A

B.
Holds open connection buffers at the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable that has been allocated space for 8 bytes?

A. Heap spraying
B. SQL injection
C. Buffer overflow
D. Slowloris attack

A

C.
Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the target of a cross‐site scripting attack?

A. Web server
B. Database server
C. Third‐party server
D. User

A

D.
User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you were to see the following in a packet capture, what would you think was happening?

<!ENTITY xxe SYSTEM “file:///etc/passwd”>]>

A. Cross‐site scripting
B. SQL injection
C. Command injection
D. XML external entity injection

A

D.
XML external entity injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protection could be used to prevent an SQL injection attack?

A. Buffer overflows
B. Input validation
C. XML filtering
D. Lateral movement

A

B.
Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security element would be a crucial part of a defense‐in‐depth network design?

A. Firewall
B. SIEM
C. Web application firewall
D. Log management system

A

A.
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a defense‐in‐breadth approach add?

A. Consideration for a broader range of attacks
B. Protection against SQL injection
C. Buffer overflow protection
D. Heap spraying protection

A

A.
Consideration for a broader range of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What attack injects code into dynamically allocated memory?

A. Buffer overflow
B. Cross‐site scripting
C. Heap spraying
D. Slowloris

A

C.
Heap spraying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If you were to see the following in a packet capture, what attack would you expect is happening?

%3Cscript%3Ealert(‘wubble’);%3C/script%3E

A. SQL injection
B. Command injection
C. Cross‐site scripting
D. Buffer overflow

A

C.
Cross‐site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What has been done to the following string?

%3Cscript%3Ealert(‘wubble’);%3C/script%3E

A. Base64 encoding
B. URL encoding
C. Encryption
D. Cryptographic hashing

A

B.
URL encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What technique does a slow read attack use?

A. Small HTTP header requests
B. Small HTTP body requests
C. Small HTTP POST requests
D. Small file retrieval requests

A

D.
Small file retrieval requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What element could be used to facilitate log collection, aggregation, and correlation?

A. Log manager
B. Firewall
C. IDS
D. SIEM

A

D.
SIEM

17
Q

What is the target of a command injection attack?

A. Operating system
B. Web server
C. Database server
D. User

A

A.
Operating system

18
Q

What would the Low Orbit Ion Cannon be used for?

A. SQL injection attacks
B. Log management
C. Denial‐of‐service attacks
D. Buffer overflows

A

C.
Denial‐of‐service attacks

19
Q

What could you use to inform a defensive strategy?

A. SIEM output
B. Attack life cycle
C. Logs
D. Intrusion detection system

A

B.
Attack life cycle

20
Q

What information does a buffer overflow intend to control?

A. Stack pointer
B. Frame pointer
C. Instruction pointer
D. Buffer pointer

A

C.
Instruction pointer

21
Q

Which of these prevention techniques would be best used against a SQL injection attack?

A. Return to libc
B. Web application firewall
C. Address space layout randomization
D. Stack canary

A

B.
Web application firewall

22
Q

If you wanted to get access to a file in the file system on a web server, which of these attack techniques might you use?

A. Cross‐site scripting
B. Command injection
C. SQL injection
D. Directory traversal

A

D.
Directory traversal

23
Q

What are two important characteristics that differentiate defensible network architectures from defense in depth?

A. Firewalls and DMZs
B. Honeypots and DMZs
C. Isolation and malware protection
D. Containment and monitoring

A

D.
Containment and monitoring

24
Q

What type of system could you use to trap and monitor an attacker?

A. Web application firewall
B. Next‐generation firewall
C. Honeypot
D. DMZ

A

C.
Honeypot

25
Q

What attack technique can be used to bypass address space layout randomization?

A. Return to libc
B. Stack canary
C. Buffer overflow
D. Return to JavaScript

A

A.
Return to libc