Chapter 5 Flashcards

1
Q

Which attack intercepts communications between a web browser and the underlying computer?

Man-in-the-middle (MITM)

Man-in-the-browser (MITB)

Replay

ARP poisoning

A

Man-in-the-browser (MITB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect?

Web server buffer and host DNS server

Reply referrer and domain buffer

Web browser and browser add-on

Host table and external DNS server

A

Host table and external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?

Privilege escalation

Session replay

Scaling exploit

Amplification

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?

Extensions

Scripts

Plug-ins

Add-ons

A

Plug-ins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?

Integer overflow

Buffer overflow

Number overflow

Heap overflow

A

Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another?

Privilege escalation

Cross-site attack

Horizontal access attack

Transverse attack

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?

The complex nature of TCP/IP allows for too many ping sweeps to be blocked.

Web application attacks use web browsers that cannot be controlled on a local computer.

Network security devices cannot prevent attacks from web resources.

Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

A

Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing?

SQL

XSS

XSRF

DDoS DNS

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which attack uses the user’s web browser settings to impersonate that user?

XDD

XSRF

Domain hijacking

Session hijacking

A

XSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the basis of an SQL injection attack?

To expose SQL code so that it can be examined

To have the SQL server attack client web browsers

To insert SQL statements through unfiltered user input

To link SQL servers into a botnet

A

To insert SQL statements through unfiltered user input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which action cannot be performed through a successful SQL injection attack?

Discover the names of different fields in a table

Reformat the web application server’s hard drive

Display a list of customer telephone numbers

Erase a database table

A

Reformat the web application server’s hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers who register domain names that are similar to legitimate domain names are performing .

address resolution

HTTP manipulation

HTML squatting

URL hijacking

A

URL hijacking or typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack involves manipulating third-party ad networks?

Session advertising

Malvertising

Clickjacking

Directory traversal

A

Malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are extensions, plug-ins, and add-ons considered to be security risks?

They are written in Java, which is a weak language.

They have introduced vulnerabilities in browsers.

They use bitcode.

They cannot be uninstalled.

A

They have introduced vulnerabilities in browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a session token?

XML code used in an XML injection attack

A random string assigned by a web server

Another name for a third-party cookie

A unique identifier that includes the user’s email address

A

A random string assigned by a web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these is not a DoS attack?

SYN flood

DNS amplification

Smurf attack

Push flood

A

Push flood

17
Q

What type of attack intercepts legitimate communication and forges a fictitious response to the sender?

SIDS

interceptor

MITM

SQL intrusion

A

MITM

18
Q

A replay attack ___.

can be prevented by patching the web browser

is considered to be a type of DoS attack

makes a copy of the transmission for use at a later time

replays the attack over and over to flood the server

A

makes a copy of the transmission for use at a later time

19
Q

DNS poisoning ___.

floods a DNS server with requests until it can no longer respond

is rarely found today due to the use of host tables

substitutes DNS addresses so that the computer is automatically redirected to another device

is the same as ARP poisoning

A

substitutes DNS addresses so that the computer is automatically redirected to another device

20
Q

What is the difference between a DoS and a DDoS attack?

DoS attacks are faster than DDoS attacks

DoS attacks use fewer computers than DDoS attacks

DoS attacks do not use DNS servers as DDoS attacks do

DoS attacks user more memory than a DDoS attack

A

DoS attacks use fewer computers than DDoS attacks