
Comptia Security+ Understanding Application Attacks and security
Flashcard
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

30 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following accurately describes a SQL injection attack? Options: An attacker exhaustively tries every possible combination of input to a system in order to bypass its security measures, An attacker exploits vulnerabilities in a web application's authentication mechanism to gain unauthorized access, An attacker injects malicious SQL code into a web application's database query to manipulate its behavior, An attacker intercepts and modifies data between a client and a server, An attacker analyzes network traffic to capture and replay authentication credentials
Back
An attacker injects malicious SQL code into a web application's database query to manipulate its behavior
2.
FLASHCARD QUESTION
Front
What is the main purpose of a cross-site scripting (XSS) attack?
Back
To inject malicious code into a web application and execute it on other users' browsers.
3.
FLASHCARD QUESTION
Front
Which of the following is a characteristic of a zero-day exploit? Options: It is a type of social engineering attack that tricks users into revealing their login credentials, It targets a vulnerability that is already known and for which a patch has been released, It uses cryptographic techniques to guess or reverse engineer passwords, It takes advantage of a software vulnerability that has not yet been discovered or patched, It exploits vulnerabilities in a network's protocols to gain unauthorized access
Back
It takes advantage of a software vulnerability that has not yet been discovered or patched
4.
FLASHCARD QUESTION
Front
Which techniques can mitigate the risk of a distributed denial of service (DDoS) attack? Options: Secure coding practices and input validation, Traffic filtering and rate limiting at the network level, Intrusion detection and prevention systems, Encryption and public key infrastructure, Network segmentation and access control lists
Back
Traffic filtering and rate limiting at the network level
5.
FLASHCARD QUESTION
Front
Which of the following correctly defines privilege escalation? Options: An attacker manipulates a web application's user interface to perform unauthorized actions on a web server, An attacker gains unauthorized access to a system by exploiting vulnerabilities in its network protocols, An attacker injects malicious SQL code into a web application's database query to manipulate its behavior, An attacker intercepts and modifies data between a client and a server, An attacker gains additional privileges or access rights in a system beyond what they were originally granted
Back
An attacker gains additional privileges or access rights in a system beyond what they were originally granted
6.
FLASHCARD QUESTION
Front
What is the main objective of a DNS spoofing attack?
Back
To redirect the traffic of a legitimate website to a malicious one.
7.
FLASHCARD QUESTION
Front
What is the main purpose of input validation in an application's security?
Back
To prevent malicious input from being processed and executed.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?