
Comptia Security+ Understanding Application Attacks and security
Authored by J. Hines
Computers
Professional Development
Used 39+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following accurately describes a SQL injection attack?
An attacker exhaustively tries every possible combination of input to a system in order to bypass its security measures
An attacker exploits vulnerabilities in a web application's authentication mechanism to gain unauthorized access
An attacker injects malicious SQL code into a web application's database query to manipulate its behavior
An attacker intercepts and modifies data between a client and a server
An attacker analyzes network traffic to capture and replay authentication credentials
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of a cross-site scripting (XSS) attack?
To perform unauthorized actions on a web server by manipulating its user interface
To inject malicious code into a web application and execute it on other users' browsers
To intercept and decrypt sensitive information transmitted over a network
To bypass authentication mechanisms and gain unauthorized access to a web application
To gain unauthorized access to a system by exploiting vulnerabilities in its network protocols
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a characteristic of a zero-day exploit?
It is a type of social engineering attack that tricks users into revealing their login credentials
It targets a vulnerability that is already known and for which a patch has been released
It uses cryptographic techniques to guess or reverse engineer passwords
It takes advantage of a software vulnerability that has not yet been discovered or patched
It exploits vulnerabilities in a network's protocols to gain unauthorized access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following techniques can be used to mitigate the risk of a distributed denial of service (DDoS) attack?
Secure coding practices and input validation
Traffic filtering and rate limiting at the network level
Intrusion detection and prevention systems
Encryption and public key infrastructure
Network segmentation and access control lists
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following correctly defines privilege escalation?
An attacker manipulates a web application's user interface to perform unauthorized actions on a web server
An attacker gains unauthorized access to a system by exploiting vulnerabilities in its network protocols
An attacker injects malicious SQL code into a web application's database query to manipulate its behavior
An attacker intercepts and modifies data between a client and a server
An attacker gains additional privileges or access rights in a system beyond what they were originally granted
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main objective of a DNS spoofing attack?
To gain unauthorized access to a system by exploiting vulnerabilities in its network protocols
To redirect the traffic of a legitimate website to a malicious one
To intercept and modify data between a client and a server
To inject malicious code into a web application and execute it on other users' browsers
To perform unauthorized actions on a web server by manipulating its user interface
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of input validation in an application's security?
To gain unauthorized access to a system by exploiting vulnerabilities in its network protocols
To perform unauthorized actions on a web server by manipulating its user interface
To intercept and modify data between a client and a server
To prevent malicious input from being processed and executed
To encrypt and decrypt sensitive information transmitted over a network
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?