Volume 4
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Easy
Sweden Garcia
Used 1+ times
FREE Resource
Enhance your content in a minute
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which SQL clause can be used by an attacker to combine new SQL queries with the prior query results in an SQL injection attack?
COMBINE
ADD
UNION
MERGE
Answer explanation
The SQL UNION clause accommodates the construction of two SQL statements, appending the results of the second SQL statement to the first. After identifying a server vulnerable to SQL injection, you can craft a secondary query by adding the keyword UNION followed by the new SELECT statement designed to retrieve data from one or more database tables.
2.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which of the following is a defense against SSRF and IMDS attacks?
Requiring multi-factor authentication
Requiring IMDSv2 for AWS
Using parametrized queries
Requiring IMDSv2 for Azure
Answer explanation
As a defender, you have several opportunities to protect against SSRF and IMDS attacks. First, you should develop a better understanding of the inputs to the applications you need to defend, including any inputs controlled by the user that could make server-side requests.
Logging resources should also be leveraged to identify misuse of systems. This can include web server logs that may reveal exploits as part of an SSRF attack, but it can also include cloud providers' logs. Finally, for AWS use, you should require that developers use IMDSv2 to protect against SSRF access to IMDS. While this will not protect against access to IMDS by other means of attack (such as command injection), it will mitigate many SSRF attack opportunities against IMDS.
3.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which attacker framework requires a hook to be loaded on an XSS-vulnerable website and has modules that allow an attacker to use the victim's browser to scan ports or deliver exploits?
XSS Shell
BeEF
Jikto
Nikto
Answer explanation
An attacker can use BeEF to launch attacks on victims. In order for the attack to be delivered, the victim must execute the BeEF hook (a JavaScript file that is available on the BeEF server). In a drive-by attack, this is not a restriction for the attacker, since the attacker will already have established access to a target website where any JavaScript code can be delivered to the victim.
4.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which characteristic distinguishes watering hole attacks from drive-by attacks?
Watering hole attacks target a specific victim group.
Watering hole attacks are focused only against an individual.
Watering hole attacks target vulnerabilities in email clients.
Watering hole attacks target individuals mainly through email.
Answer explanation
A watering hole attack utilizes the same techniques as a drive-by attack with one exception: it is targeted. Where drive-by attacks are mostly opportunistic (the attacker will gladly compromise any vulnerable host), a watering hole attack involves a targeting element against a specific vertical industry or other organization such as a company, government, or political party.
5.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Drive-by and watering hole attacks use available exploits to target browser vulnerabilities or downloaded files that may be associated with a browser. How are downloaded files associated with a browser thereby allowing exploitation?
MIME file type
DeepBlueCli
Microsoft Office file
MsfVenom
Answer explanation
Drive-by and watering hole attacks use available exploits to take advantage of browser vulnerabilities as well as vulnerabilities in associated software. These exploits may target the browser itself or downloaded files associated with a browser MIME file type.
6.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
XSS is an attack against a user, exploiting a vulnerability where?
Browser
Code
User
Server
Answer explanation
Cross-site scripting (XSS) is an attack against an end-user, leveraging a vulnerability on a server that is not performing input or output validation. This is different from the command injection attack where the server vulnerability is used to exploit the server. In an XSS attack, the user runs malicious code supplied by the attacker from the vulnerable server.
7.
MULTIPLE CHOICE QUESTION
2 mins • 2 pts
Which of the following defenses protects against XSS but not SQL injection attacks?
Filtering dangerous characters
Input validation
Parametrized queries
Content Security Policy
Answer explanation
One defense against cross-site scripting (XSS) attacks is using the Content Security Policy (CSP) header on web servers to declare where linked resources can be loaded from in the requested page by the browser. While input validation and filtering dangerous characters are other important defenses, they are useful against both XSS and SQL injection attacks. Using parametrized queries is a defense exclusive to SQL injection attacks, not XSS attacks.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
26 questions
Macromedia Flash
Quiz
•
8th Grade - Professio...
25 questions
CompTIA Network+ Revision: Cables
Quiz
•
University - Professi...
25 questions
Chapter 1 - SDLC Review
Quiz
•
Professional Development
25 questions
review
Quiz
•
Professional Development
25 questions
WEBZEN MCQ
Quiz
•
Professional Development
25 questions
The Best Minecraft Quiz Ever!!!!!
Quiz
•
1st Grade - Professio...
25 questions
Infinity coding school
Quiz
•
Professional Development
25 questions
ICDL for Afghan girls
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...
