Module 17: Attacking What We Do Flashcards

1
Q

Which action best describes a MAC address spoofing attack?

flooding the LAN with excessive traffic
bombarding a switch with fake source MAC addresses
altering the MAC address of an attacking host to match that of a legitimate host
forcing the election of a rogue root bridge

A

altering the MAC address of an attacking host to match that of a legitimate host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the result of a DHCP starvation attack?

Clients receive IP address assignments from a rogue DHCP server.
Legitimate clients are unable to lease IP addresses.
The IP addresses assigned to legitimate clients are hijacked.
The attacker provides incorrect DNS and default gateway information to clients.

A

Legitimate clients are unable to lease IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In which type of attack is falsified information used to redirect users to malicious Internet sites?

domain generation
ARP cache poisoning
DNS amplification and reflection
DNS cache poisoning

A

DNS cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of DNS attack involves the cybercriminal compromising a parent domain and creating multiple subdomains to be used during the attacks?

  • shadowing
  • cache poisoning
  • tunneling
  • amplification and reflection
A

shadowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which language is used to query a relational database?

  • Java
  • Python
  • SQL
  • C++
A

SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term is used for bulk advertising emails flooded to as many end users as possible?

  • spam
  • adware
  • brute force
  • phishing
A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol would be the target of a cushioning attack?

  • ARP
  • DHCP
  • HTTP
  • DNS
A

HTTP

Explanation: The HTTP 302 cushioning attack is used by cybercriminals to take advantage of the 302 Found HTTP response status code to redirect the browser of the user to a new location, usually a malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

  • ICMP
  • DNS
  • DHCP
  • HTTP or HTTPS
A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an objective of a DHCP spoofing attack?

  • to intercept DHCP messages and alter the information before sending to DHCP clients
  • to gain illegal access to a DHCP server and modify its configuration
  • to provide false DNS server addresses to DHCP clients so that visits to a legitimate web server are directed to a fake server
  • to attack a DHCP server and make it unable to provide valid IP addresses to DHCP clients
A

to provide false DNS server addresses to DHCP clients so that visits to a legitimate web server are directed to a fake server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do cybercriminals make use of a malicious iFrame?

  • The attacker embeds malicious content in business appropriate files.
  • The iFrame allows multiple DNS subdomains to be used.
  • The attacker redirects traffic to an incorrect DNS server.
  • The iFrame allows the browser to load a web page from another source.
A

The iFrame allows the browser to load a web page from another source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a characteristic of a DNS amplification and reflection attack?

  • Threat actors hide their phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts.
  • Threat actors use malware to randomly generate domain names to act as rendezvous points.
  • Threat actors use DNS open resolvers to increase the volume of attacks and to hide the true source of an attack.
  • Threat actors use a DoS attack that consumes the resources of the DNS open resolvers.
A

Threat actors use DNS open resolvers to increase the volume of attacks and to hide the true source of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two attacks target web servers through exploiting possible vulnerabilities of input functions used by an application? (Choose two.)

  • SQL injection
  • port scanning
  • cross-site scripting
  • port redirection
  • trust exploitation
A

SQL injection
cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly