Filters
Question type

Study Flashcards

If a MAC address is permanently "burned" into a network interface card,how can an attacker change the MAC address to perform an ARP poisoning attack?

Correct Answer

verifed

verified

A MAC address is permanently "burned" in...

View Answer

In an integer overflow attack,an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

Correct Answer

verifed

verified

What type of web server application attacks introduce new input to exploit a vulnerability?


A) language attacks
B) cross-site request attacks
C) hijacking attacks
D) injection attacks

Correct Answer

verifed

verified

Where are MAC addresses stored for future reference?


A) MAC cache
B) Ethernet cache
C) ARP cache
D) NIC

Correct Answer

verifed

verified

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?


A) spoofing
B) URL hijacking
C) Web squatting
D) typo hijacking

Correct Answer

verifed

verified

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?


A) IP spoofing
B) denial of service
C) DNS Poisoning
D) smurf attack

Correct Answer

verifed

verified

The malicious content of an XSS URL is confined to material posted on a website

Correct Answer

verifed

verified

What specific ways can a session token be transmitted? (Choose all that apply. )


A) In the URL.
B) In the trailer of a frame.
C) In the header of a packet.
D) In the header of the HTTP requisition.

Correct Answer

verifed

verified

What technology expands the normal capabilities of a web browser for a specific webpage?


A) extensions
B) add-ons
C) plug-ins
D) Java applets

Correct Answer

verifed

verified

What are the two types of cross-site attacks? (Choose all that apply. )


A) cross-site input attacks
B) cross-site scripting attacks
C) cross-site request forgery attacks
D) cross-site flood attacks

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer