An IDS has sent multiple alerts in response to increased traffic. Upon investigation, you realize it is due to a spike in network traffic from several sources. Assuming this is malicious, which of the following is the MOST likely explanation?
Security+ Study Guide-07 Protecting Against Advanced Attacks

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 5+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
An ARP poisoning attack
A DNS poisoning attack
A domain hijacking attack
A DDoS attack
Answer explanation
A distributed denial-of-service (DDoS) attack causes spikes in network traffic as multiple systems attempt to connect to a server and deplete the target’s resources.
An Address Resolution Protocol (ARP) poisoning attack attempts to mislead systems about the source media access control (MAC) address.
A Domain Name System (DNS) poisoning attack attempts to redirect web browsers to malicious URLs.
In a domain hijacking attack, an attacker changes a domain name registration without permission from the owner.
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
While investigating performance issues on a web server, you verified that the CPU usage was about 10 percent five minutes ago. However, it now shows that the CPU usage has been averaging 98 for the last two minutes.
Which of the following BEST describes what this web server is experiencing?
Resource exhaustion
DDoS
A buffer overflow attack
A memory leak
Answer explanation
CPU usage averaging 98 percent indicates resource exhaustion. The scenario doesn’t indicate the cause of the increased usage, so resource exhaustion is the best answer.
A distributed denial-of-service (DDoS) attack could cause this. However, a surge in traffic from an effective marketing campaign sent via email could also cause a surge in resource usage.
A buffer overflow attack is a type of DDoS attack, but the scenario doesn’t give enough information to indicate a buffer overflow attack has taken place.
The scenario only mentions CPU usage, so there isn’t any indication of a memory leak.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator regularly connects to a server using SSH without any problems. Today, he sees a message similar to the following graphic when he connects to the server.
Which of the following is the MOST likely reason for this message?
Rogue access point
On-path attack
MAC flodding
ARP poisoning
Answer explanation
The message indicates a potential man-in-the-middle (MITM) attack, which is also known as an on-path attack. Specifically, it indicates that the key on the host system has changed, which may be due to the administrator connecting to the MITM system instead of the target system.
None of the other answers are related to incorrect cryptographic keys. A rogue access point is an unauthorized wireless access point.
Media access control (MAC) flooding is an attack on a switch, attempting to overload it with different MAC addresses.
An Address Resolution Protocol (ARP) poisoning attack misleads computers or switches about a system’s actual MAC address.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Homer complains that his system started acting erratically today. You discover that malware infected his system, but you discover he didn't open any email during the day. He mentions that he has been browsing the Internet all day.
Which of the following could you check to see where the malware MOST likely originated?
Web server logs
Mail server logs
PowerShell logs
DNS server logs
Answer explanation
Domain Name System (DNS) logs will record DNS queries, such as what hostnames it resolved to IP addresses. The log entries would show all the domains that Homer visited during the day. One of these is most likely the one that downloaded malware onto his system.
A web server would show activity on the web server, but you wouldn’t have access to web servers controlled by others.
Homer didn’t open any email, so the mail server logs wouldn’t help.
PowerShell logs may show activity, but only if the malware used PowerShell. However, the PowerShell logs are unlikely to show who ran PowerShell scripts.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
While reviewing logs for a web application, a security analyst notices that it was crashed several times, reporting a memory error. Shortly after it crashes, the logs show malicious code that isn't part of a known application.
Which of the following is MOST likely occurring?
Buffer overflow
ARP poisoning
Privilege escalation
Replay
Answer explanation
Buffer overflow attacks often cause an application to crash and expose system memory. Attackers then write malicious code into the exposed memory and use different techniques to get the system to run this code. None of the other attacks insert malicious code into memory.
An Address Resolution Protocol (ARP) poisoning attack attempts to mislead systems about the source media access control (MAC) address.
Privilege escalation techniques attempt to give an attacker more rights and permissions.
In a replay attack, the attacker intercepts data and typically attempts to use the intercepted data to impersonate a user or system.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Web developers are implementing error handling in a database application accessed by a web browser.
Which of the following would be the BEST way to implement this?
Display a detailed error message but log generic information on the error
Display a generic error message but log detailed information on the error
Display a generic error message and log generic information on the error
Display a detailed error message and log detailed information on the error
Answer explanation
You should display a generic error message but log detailed information on the error.
Detailed error messages to the user are often confusing to them and give attackers information they can use against the system.
Logging generic information makes it more difficult to troubleshoot the problem later.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A web developer is adding input validation techniques to a website application.
Which of the following should the developer implement during this process?
Validation on the server-side
Validation on the client-side
Normalization techniques
Memory management techniques
Answer explanation
At a minimum, input validation should be performed on the server-side.
Client-side validation can be combined with server-side validation, but attackers can bypass client-side input validation if it is used alone.
Normalization techniques organize tables and columns in a database to reduce redundant data but have nothing to do with input validation.
Memory management is a secure coding technique that helps prevent memory errors.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Security+ Study Guide-10 Understanding Cryptography and PKI

Quiz
•
Professional Development
12 questions
Cycle 4: Session 6 General Review.

Quiz
•
Professional Development
20 questions
Linux Managing Systems

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 1

Quiz
•
Professional Development
20 questions
101-120

Quiz
•
Professional Development
10 questions
6. Echo - Advance

Quiz
•
Professional Development
15 questions
CloudBinary_Apache_Tomcat_Quiz- 2

Quiz
•
Professional Development
11 questions
Cloud Computing

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade