Quiz 12 Flashcards

1
Q

he Internet backbone is connected to regional ISPs via which of the following?

Question 1 options:

carrier network points

network service points

network access points

POP ISPs

A

network access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many root servers are in the DNS infrastructure?

Question 2 options:

11

14

10

13

A

13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attackers can exploit routing information updates to do which of the following? (Choose all that apply.)
Question 3 options:

A) Poison DNS caches.

B) Use IP spoofing to intercept packets.

C) Launch DoS attacks.

D) Launch man-in-the-middle attacks.

A

B) Use IP spoofing to intercept packets.

C) Launch DoS attacks.

D) Launch man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers often use DNS cache poisoning to do which of the following?

Question 4 options:

Query systems on a network one by one.

Steer unsuspecting users to a server of their choice instead of the Web site where users intended to go.

Flood the network with packets and cause it to crash.

Install a virus on the network.

A

Steer unsuspecting users to a server of their choice instead of the Web site where users intended to go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is caused by a flaw in how a running process allocates memory
to a variable?
Question 5 options:

buffer overflow

broken authentication

unsecured cryptographic storage

SQL injection

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a common type of SQL injection attack? (Choose all that apply.)
Question 6 options:

A) system tray attack

B) query string attack

C) browser executable attack

D) Web form attack

A

B) query string attack

D) Web form attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a SQL injection attack, which character is an attacker most likely to use?

Question 7 options:

single quotation mark

exclamation mark

double quotation mark

asterisk

A

single quotation mark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following attack methods target Web users? (Choose all that apply.)

Question 8 options:

A) phishing

B) pharming

C) SQL injection

D) social engineering

A

A) phishing

B) pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a requirement for a successful file attachment attack?

Question 9 options:

The user must reply to the e-mail that contains the attachment.

The user must open the file attachment.

The user must delete the file attachment immediately.

The attachment must be an image file.

A

The user must open the file attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following factors enables attackers to program ActiveX controls to run malicious code on a user’s Web browser? (Choose all that apply.)
Question 10 options:

A) ActiveX controls do not require user action to be activated.

B) ActiveX controls run in a sandbox that allows interaction with the OS.

C) ActiveX controls have almost full access to the Windows OS.

D) ActiveX controls run automatically when the browser loads the Web page that contains them.

A

A) ActiveX controls do not require user action to be activated.

C) ActiveX controls have almost full access to the Windows OS.

D) ActiveX controls run automatically when the browser loads the Web page that contains them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Web server can be hardened just by configuring the Web application correctly.

Question 11 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For optimum efficiency, configure a domain controller to function also as an IIS Web
server.
Question 12 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When securing an Apache Web server, which of the following tasks is not necessary?

Question 13 options:

deleting unneeded or default Apache files and sample code

disabling processing of server-side includes (SSIs)

creating a privileged user ID for the Apache Web User account with root access

installing the latest Apache patches

A

creating a privileged user ID for the Apache Web User account with root access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a DNS zone transfer, what is actually transferred?

Question 14 options:

fully qualified domain names and IP addresses

server MAC addresses

usernames and passwords

UDP and ICMP messages

A

fully qualified domain names and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To keep log files organized, store them on the server you are monitoring.

Question 15 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly