Chapter 4 - Types of Attacks Flashcards

1
Q

Your manager has called you into the office and has expressed concerns about a number of news reports on social engineering attacks. Your manager would like to know what can be done to protect the company against social engineering attacks. What is your response?

A

User awareness and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your manager has read reports of tailgating being a problem with security in many organizations and wants to know what can be done to prevent tailgating. Which of the following controls will help protect against tailgating?

A. Locked doors
B. Electronic keypads
C. Swipe cards
D. Mantrap

A

D. Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the term used for a phishing attack that is targeted toward a specific person such as executive of a company?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack results in the victim’s system not being able to perform its job function?

A

Denial of Service

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The hacker has managed to poison everyone’s ARP cache so that all traffic to the internet is being sent to the hacker’s system before being routed out to the internet. What type of attack is this?

A

Man-in-the-Middle

MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What file can the hacker modify after compromising your system that could lead you to the wrong web site?

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack is a smurf attack?

A

Distributed Denial of Service

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

John has been studying techniques used by hackers and decides to send a packet to your system, but ensures that he alters the source IP address of the packet so it looks like it came from someone else. What type of attack is this?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your manager has been reading a lot about popular password attacks such as dictionary attacks and brute-force attacks. Your manager is worried that your company is susceptible to such attacks. Which of the following controls will help protect against a brute-force attack?

A. Password complexity
B. Account lockout
C. Network firewall
D. Intrusion detection system

A

B. Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a popular method to protect against dictionary attacks?

A. Password complexity
B. Account lockout
C. Network firewall
D. Intrusion detection system

A

A. Password complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With a dictionary attacks, how does the password-cracking software attempt to figure out the passwords of the different user accounts?

A

Reads the passwords from a word list file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are monitoring network traffic and you notice a packet with (pass’ 1=1- -) in the content of the packet. What type of attack has occurred?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack involves the hacker sending too much data to an application that typically results in the hacker gaining remote access to the system with administrative permissions?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hacker tries to compromise your system by submitting script code into a field in a web page that is then submitted and stored as data in the web site database. The hacker is anticipating when you navigate to the site and display the data, that your browser will parse the script and execute it. What type of attack is this?

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When looking at the web server log files, you notice that a lot of the requests that have hit the web site are navigating to the /scripts/..%c0%af../winnt/system32 folder. What type of attack is occurring?

A

Folder traversal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly