Application/Service Attacks

Application/Service Attacks

KG - Professional Development

18 Qs

quiz-placeholder

Similar activities

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

University

15 Qs

Lesson 2.6 Computer Fundamentals

Lesson 2.6 Computer Fundamentals

Professional Development

16 Qs

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Application/Service Attacks

Application/Service Attacks

Assessment

Quiz

Computers

KG - Professional Development

Hard

Created by

Kai Grant

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DoS

An attack on a computer or network

device in which multiple computers send data and requests to the device in an attempt

to overwhelm it so that it cannot perform normal operations

An attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems

An attack from a single source that attempts to disrupt the services provided by the attacked system

An attack that changes the registration of a domain name without permission from the owner

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS

An attack from a single source that attempts to disrupt the services provided by the attacked system

An attack that increases the amount of bandwidth sent to a victim

DNS Poisoning-An attack that modifies or corrupts DNS result

The process of gaining elevate rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges

An attack on a computer or network

device in which multiple computers send data and requests to the device in an attempt

to overwhelm it so that it cannot perform normal operations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Man-in-the-middle

An attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems

An attack that misleads systems about the actual MAC address of a system

A vulnerability or bug that is unknown to trusted sources but can be exploited by attackers

An attack that changes the registration of a domain name without permission from the owner

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Buffer overflow

An attack that tricks users into clicking something other than what they think they're clicking

An error that occurs when an application receives more input, or different input, than it expects. It exposes system memory that is normally inaccessible

An attack where the data is captured and replayed. Attackers typically modify data before replaying it

An attack that injects code or commands

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Injection

A driver manipulation method. Developers rewrite the code without changing the driver's behavior

The process of gaining elevate rights and permissions. Malware typically uses a variety of techniques to gain elevated privileges

The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called typosquatting

An attack that injects code or commands

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cross-Site Scripting (XSS)

A web application attack. XSRF attacks trick users into performing actions on websites, such as making purchases, without their knowledge

A password attack that captures and uses the hash of a password. It attempts to log on as the hash and is commonly associated with the Microsoft NTLM protocol

A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site

An attack from a single source that attempts to disrupt the services provided by the attacked system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cross-Site Request Forgery

A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site

An attack that changes the source IP address

A web application attack. XSRF attacks trick users into performing actions on websites, such as making purchases, without their knowledge

An attack where the data is captured and replayed. Attackers typically modify data before replaying it

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?