Filters
Question type

Study Flashcards

How does a cross-site scripting (XSS) attack work?

Correct Answer

verifed

verified

A cross site scripting attack ...

View Answer

Because of the minor role it plays, DNS is never the focus of attacks.

Correct Answer

verifed

verified

False

Match the following terms to the appropriate definitions. -An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer​


A) Address Resolution Protocol (ARP)
B) ARP Poisoning
C) Buffer overflow attack
D) Command injection
E) Cross-site scripting (XSS)
F) DNS poisoning
G) Flash cookie
H) Ping flood
I) Session token
J) Smurf attack

Correct Answer

verifed

verified

List three of the most common Web application attacks.

Correct Answer

verifed

verified

The most common Web applicatio...

View Answer

To what specific directory are users generally restricted to on a web server?


A) top
B) base
C) root
D) tap

Correct Answer

verifed

verified

How does a SYN flood attack work?​

Correct Answer

verifed

verified

A SYN flood attack involves an attacker ...

View Answer

Match the following terms to the appropriate definitions. -​An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.


A) Address Resolution Protocol (ARP)
B) ARP Poisoning
C) Buffer overflow attack
D) Command injection
E) Cross-site scripting (XSS)
F) DNS poisoning
G) Flash cookie
H) Ping flood
I) Session token
J) Smurf attack

Correct Answer

verifed

verified

ARP poisoning is successful because there are few authentication procedures to verify ARP requests and replies.

Correct Answer

verifed

verified

False

Which SQL injection statement can be used to erase an entire database table?


A) whatever'; DROP TABLE members; --
B) whatever'; DELETE TABLE members; --
C) whatever'; UPDATE TABLE members; --
D) whatever'; RENAME TABLE members; --

Correct Answer

verifed

verified

What language below is designed to display data, with a primary focus on how the data looks?


A) XML
B) HTML
C) SGML
D) ISL

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​An attack that injects scripts into a web application server to direct attacks at clients.


A) Address Resolution Protocol (ARP)
B) ARP Poisoning
C) Buffer overflow attack
D) Command injection
E) Cross-site scripting (XSS)
F) DNS poisoning
G) Flash cookie
H) Ping flood
I) Session token
J) Smurf attack

Correct Answer

verifed

verified

HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format?


A) ​blocks
B) ​marks
C) ​taps
D) ​tags

Correct Answer

verifed

verified

D

In a drive-by download attack, provide an example of how an attacker might avoid visual detection.​

Correct Answer

verifed

verified

An attacker might make use of ...

View Answer

Attacks that take place against web based services are considered to be what type of attack?


A) client-side
B) hybrid
C) server-side
D) relationship

Correct Answer

verifed

verified

What is the goal of a directory traversal attack?​

Correct Answer

verifed

verified

A directory traversal attack is used to ...

View Answer

Describe the two types of privilege escalation.

Correct Answer

verifed

verified

Vertical privilege escalation is when a ...

View Answer

Choose the SQL injection statement example below that could be used to find specific users:


A) whatever' OR full_name = '%Mia%'
B) whatever' OR full_name IS '%Mia%'
C) whatever' OR full_name LIKE '%Mia%'
D) whatever' OR full_name equals '%Mia%'

Correct Answer

verifed

verified

A web browser makes a request for a web page using the ________________.

Correct Answer

verifed

verified

Hypertext ...

View Answer

Match the following terms to the appropriate definitions. -​An attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim.


A) Address Resolution Protocol (ARP)
B) ARP Poisoning
C) Buffer overflow attack
D) Command injection
E) Cross-site scripting (XSS)
F) DNS poisoning
G) Flash cookie
H) Ping flood
I) Session token
J) Smurf attack

Correct Answer

verifed

verified

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​


A) ​Privilege escalation
B) ​DNS cache poisoning
C) ​ARP poisoning
D) ​Man-in-the-middle

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer