DNS Attacks

DNS Attacks

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a DNS poisoning attack?

To encrypt DNS traffic.

To prevent users from accessing any websites.

To redirect users to an IP address they did not originally intend to visit.

To speed up DNS resolution for legitimate websites.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true regarding modifying a client's host file in the context of DNS poisoning?

It requires modifying the DNS server itself.

The host file takes precedence over DNS queries.

It is a common method for attackers to use without elevated rights.

It only affects the client's ability to access local network resources.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a DNS spoofing scenario where an attacker modifies the DNS server's configuration, what is the immediate consequence for users querying the affected domain?

Users will be unable to resolve the domain name.

Users will receive the legitimate IP address from their local cache.

Users will be directed to an IP address specified by the attacker.

The DNS server will automatically revert to its original configuration.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "domain hijacking" primarily involve in the context of DNS attacks?

Gaining physical access to the DNS server hardware.

Intercepting DNS queries in real-time.

Obtaining control over the domain registration to redirect traffic.

Flooding the DNS server with excessive requests.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of domain hijacking?

To directly access and modify server configurations.

To gain control over where internet traffic flows for a domain.

To install ransomware directly onto a company's main servers.

To physically steal hardware from data centers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as a common method for attackers to gain access to a domain registration account?

Brute force attacks.

Social engineering the password.

Exploiting zero-day vulnerabilities in DNS software.

Gaining access to the email address managing the account.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Brazilian bank domain hijacking incident, what was a significant consequence for the bank's customers?

The bank's physical branches were forced to close for six hours.

Attackers gained the ability to collect sensitive financial data like usernames and passwords.

All customer assets were immediately transferred to hacker-controlled accounts.

The bank's website was permanently shut down.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used in URL hijacking to trick users?

Directly hacking into the user's local DNS cache.

Registering a domain name that is a common misspelling or variation of a legitimate one.

Sending unsolicited physical mail with malicious QR codes.

Disabling the user's internet connection.