Review 10 Flashcards

(15 cards)

1
Q

When securing network traffic, which of the items below is NOT recommended?

Question options:

Implement switched networks

Encrypt sensitive traffic

Use IPv4

Use secure protocols

A

Use IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What mode does your network interface (NIC) need to be in order to effectively sniff traffic?

Question options:

Active

Passive

Isolation

Promiscuous

A

Promiscuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of DoS attack is also known as a “Teardrop” attack?

Question options:

Fragmentation

Smurf

Plashing

Fraggle

A

Fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a session hijacking vulnerability?

Question options:

Short session IDs

Simple algorithms

Simple passwords

No account lockout

A

Simple passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of DoS attack targets ICMP protocol weaknesses?

Question options:

Fragmentation

Smurf

Fraggle

Plashing

A

Smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of security device can search for anomalies in network traffic, and detect network cards running in promiscuous mode and flag MAC addresses that are not a part of the internal network.

Question options:

Port Scanners

Routers

Firewalls

NIDS

A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of DoS attack targets UDP protocol weaknesses?

Question options:

Smurf

Plashing

Fraggle

Fragmentation

A

Fraggle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes a cooperative team that is comprised a many zombie computers?

Question options:

Attacknet

Zombienet

Botnet

Coopnet

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of sniffing involves simply monitoring traffic?

Question options:

Active sniffing

Passive sniffing

Information sniffing

Traffic sniffing

A

Passive sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of attack takes advantage of the fact that there is not a verified connection between the server or host machine and the client?

Question options:

UDP session hijacking

DNS spoofing

TCP/IP session hijacking

Session fixation

A

UDP session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of DoS attack exploits vulnerabilities in protocols and broadcast networks?

Question options:

Protocol

Volumetric

Fragmentation

Amplification

A

Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If a user recently completed a form, and you were able to find a session ID in a hidden field in the HTTP POST command, what type of Session Hijacking would this be?

Question options:

Application Level Hijacking

Session Level Hijacking

Transport Level Hijacking

Network Level Hijacking

A

Application Level Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What sniffing method creates a duplicate of all network traffic on a port and sends it to another device?

Question options:

MAC spoofing

ARP poisoning

MAC flooding

Port mirroring

A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a protocol that is vulnerable to sniffing?

Question options:

FTP

SSH

IMAP

SMTP

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________ attacks involves the injection of malicious Java, Flash, or HTML script into web applications.

Question options:

Man-in-the-middle

Cross-site scripting

Script injection

Session fixation

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly