Exam #4 - Threats, Attacks, and Vulnerabilities - P.2
Nội dung: Các mối đe dọa, tấn công và lỗ hổng - P2 - Số câu: 15 - Yêu cầu: 13/15
1. Frank is a network administrator for a small college. He discovers that several machines on his network are infected with malware. That malware is sending a flood of packets to a target external to the network. What best describes this attack?
Trả lời đúng
Trả lời sai
2. Dennis uses an on-path attack to cause a system to send HTTPS traffic to his system and then forwards it to the actual server the traffic is intended for. What type of password attack can he conduct with the data he gathers if he captures all the traffic from a login form?
Trả lời đúng
Trả lời sai
3. Which of the following is not a common means of attacking RFID badges?
Trả lời đúng
Trả lời sai
4. CVE is an example of what type of feed?
Trả lời đúng
Trả lời sai
5. Farès is the network security administrator for a company that creates advanced routers and switches. He has discovered that his company’s networks have been subjected to a series of advanced attacks over a period of time. What best describes this attack?
Trả lời đúng
Trả lời sai
6. What type of information is phishing not commonly intended to acquire?
Trả lời đúng
Trả lời sai
7. Matt discovers that a system on his network is sending hundreds of Ethernet frames to the switch it is connected to, with each frame containing a different source MAC address. What type of attack has he discovered?
Trả lời đúng
Trả lời sai
8. Spyware is an example of what type of malware?
Trả lời đúng
Trả lời sai
9. Which of the following is commonly used in a distributed denial-of-service (DDoS) attack?
Trả lời đúng
Trả lời sai
10. Angela reviews the authentication logs for her website and sees attempts from many different accounts using the same set of passwords. What is this attack technique called?
Trả lời đúng
Trả lời sai
11. What process typically occurs before card cloning attacks occur?
Trả lời đúng
Trả lời sai
12. Which of the following is an attack that seeks to attack a website, based on the website’s trust of an authenticated user?
Trả lời đúng
Trả lời sai
13. Angela has discovered an attack against some of the users of her website that leverage URL parameters and cookies to make legitimate users perform unwanted actions. What type of attack has she most likely discovered?
Trả lời đúng
Trả lời sai
14. Nathan discovers the following code in the directory of a compromised user. What language is it using, and what will it do?
echo "ssh-rsa ABBAB4KAE9sdafAK...Mq/jc5YLfnAnbFDRABMhuWzaWUp root@localhost" >> /root/.ssh/authorized_keys
Trả lời đúng
Trả lời sai
15. Michelle discovers that a number of systems throughout her organization are connecting to a changing set of remote systems on TCP port 6667. What is the most likely cause of this, if she believes the traffic is not legitimate?
Trả lời đúng
Trả lời sai
Cảm xúc của bạn?