Search Header Logo

Security Ch.5

Professional Development

Used 6+ times

Security Ch.5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack intercepts communications between a web browser and the underlying computer?

man-in-the-middle (MITM)

man-in-the-browser (MITB)

replay

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect?

Web server buffer and host DNS server

Reply referrer and domain buffer

Web browser and browser add-on

Host table and external DNS server

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about?

Privilege escalation

Session replay

Scaling exploit

Amplification

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser?

Extensions

Scripts

Plug-ins

Add-ons

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker who manipulates the maximum size of an integer type would be performing what kind of attack?

integer overflow

buffer overflow

number overflow

heap overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another?

privilege escalation

cross-site attack

horizontal access attack

transverse attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks?

The complex nature of TCP/IP allows for too many ping sweeps to be blocked.

Web application attacks use web browsers that cannot be controlled on a local computer.

Network security devices cannot prevent attacks from web resources.

Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?