Filters
Question type

Study Flashcards

If a MAC address is permanently "burned" into a network interface card,how can an attacker change the MAC address to perform an ARP poisoning attack?

Correct Answer

verifed

verified

A MAC address is permanently "burned" in...

View Answer

What are the two types of cross-site attacks? (Choose all that apply. )


A) cross-site input attacks
B) cross-site scripting attacks
C) cross-site request forgery attacks
D) cross-site flood attacks

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

In an integer overflow attack,an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

A) True
B) False

Correct Answer

verifed

verified

If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known web site in order for the attacker to gain Web traffic to generate income,what type of attack are they using?


A) spoofing
B) URL hijacking
C) Web squatting
D) typo hijacking

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What specific ways can a session token be transmitted? (Choose all that apply. )


A) In the URL.
B) In the trailer of a frame.
C) In the header of a packet.
D) In the header of the HTTP requisition.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What technology expands the normal capabilities of a web browser for a specific webpage?


A) extensions
B) add-ons
C) plug-ins
D) Java applets

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to the victim's computer?


A) IP spoofing
B) denial of service
C) DNS Poisoning
D) smurf attack

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

The malicious content of an XSS URL is confined to material posted on a website

A) True
B) False

Correct Answer

verifed

verified

Where are MAC addresses stored for future reference?


A) MAC cache
B) Ethernet cache
C) ARP cache
D) NIC

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What type of web server application attacks introduce new input to exploit a vulnerability?


A) language attacks
B) cross-site request attacks
C) hijacking attacks
D) injection attacks

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer