Скачать презентацию CHAPTER 7 IDENTIFYING ADVANCED ATTACKS Mc Kinley Technology Скачать презентацию CHAPTER 7 IDENTIFYING ADVANCED ATTACKS Mc Kinley Technology

f92e9716b12807bb114bb7f3bd475e7c.ppt

  • Количество слайдов: 49

CHAPTER 7: IDENTIFYING ADVANCED ATTACKS Mc. Kinley Technology HS - Cybersecurity CHAPTER 7: IDENTIFYING ADVANCED ATTACKS Mc. Kinley Technology HS - Cybersecurity

Question 1 An attacker enters a string of data in a web application’s input Question 1 An attacker enters a string of data in a web application’s input form and crashes it. What type of attack is this? A. Do. S B. DDo. S C. Man-in-the-Middle D. Header manipulation

Question 2 What will protect against a SYN attack? A. Input validation B. Error Question 2 What will protect against a SYN attack? A. Input validation B. Error handling C. Flood guard D. Cross-site scripting

Question 3 What can an administrator use to detect a DDo. S attack? A. Question 3 What can an administrator use to detect a DDo. S attack? A. Privilege escalation B. Performance baseline C. Web form sanitization D. Antivirus software

Question 4 A user browsing the Internet notices erratic behavior right before the user’s Question 4 A user browsing the Internet notices erratic behavior right before the user’s system crashes. After rebooting, the system is slow and the user detects hundreds of outbound connections. What likely occurred? A. The system has become a botnet B. The system is hosting a botnet C. The system is spamming other users D. The system has joined a botnet

Question 5 A computer is regularly communicating with an unknown IRC server and sending Question 5 A computer is regularly communicating with an unknown IRC server and sending traffic without user interaction. What is likely causing this? A. Buffer overflow B. Cross-site scripting C. Botnet D. Rootkit

Question 6 Of the following choices, what uses a command control server? A. Do. Question 6 Of the following choices, what uses a command control server? A. Do. S attacks B. Trojans C. Man-in-the-Middle D. Botnet

Question 7 Of the following choices, what type of attack can intercept traffic and Question 7 Of the following choices, what type of attack can intercept traffic and insert malicious code into a network conversation? A. Spim B. Xmas attack C. LDAP attack D. Man-in-the-middle

Question 8 What can a header manipulation attack modify? A. Flags B. Buffers C. Question 8 What can a header manipulation attack modify? A. Flags B. Buffers C. Databases D. Signature definitions

Question 9 An attacker is sending false hardware address updates to a system, causing Question 9 An attacker is sending false hardware address updates to a system, causing the system to redirect traffic to an attacker. What type of attack is this? A. IRC B. ARP poisoning C. Xmas attack D. DNS poisoning

Question 10 What can mitigate ARP poisoning attacks in a network? A. Disable unused Question 10 What can mitigate ARP poisoning attacks in a network? A. Disable unused ports on a switch B. Man-in-the-middle C. DMZ D. VLAN segregation

Question 11 You manage a server hosting a third-party database application. You want to Question 11 You manage a server hosting a third-party database application. You want to ensure that the application is secure and all unnecessary services are disabled. What should you perform? A. Secure code review B. Application hardening C. White box testing D. Black box testing

Question 12 Of the following choices, what is a step used to harden a Question 12 Of the following choices, what is a step used to harden a database application? A. Enabling all services B. Disabling default accounts and changing default passwords C. Disabling SQL D. Disabling stored procedures

Question 13 An organization develops its own software. Of the following choices, what is Question 13 An organization develops its own software. Of the following choices, what is a security practice that should be included in the process? A. Check vendor documentation B. SDLC Waterfall model C. Code review D. Enabling command injection

Question 14 An attacker in entering incorrect data into a form on a web Question 14 An attacker in entering incorrect data into a form on a web page. The result shows the attacker the type of database used by the website and provides hints on what SQL statements the database accepts. What can prevent this? A. Error handling B. Antivirus software C. Anti-spam software D. Flood guards

Question 15 Your organization hosts several websites accessible on the Internet and is conducting Question 15 Your organization hosts several websites accessible on the Internet and is conducting a security review of these sites. Of the following choices, that is the most common security issue for web-based applications? A. Input validation B. Phishing C. Whaling D. Social engineering

Question 16 An IDS detected a NOOP sled. What kind of attack does this Question 16 An IDS detected a NOOP sled. What kind of attack does this indicate? A. Input validation B. SQL injection C. Cross-site scripting D. Buffer overflow

Question 17 A web-based application expects a user to enter eight characters into the Question 17 A web-based application expects a user to enter eight characters into the text box. What is a potential vulnerability for this application? A. Input validation B. Buffer overflow C. SYN flood D. Flood guard

Question 18 Of the following choices, what can help prevent SQL injection attacks? A. Question 18 Of the following choices, what can help prevent SQL injection attacks? A. Output validation B. NOOP sleds C. Stored procedures D. Antivirus software

Question 19 A web developer wants to prevent cross-site scripting. What should the developer Question 19 A web developer wants to prevent cross-site scripting. What should the developer do? A. Use input validation to remove hypertext B. Use input validation to remove cookies C. Use input validation to SQL statements D. Use input validation to overflow buffers

Question 20 A website prevents users from using the lessthan character (<) when entering Question 20 A website prevents users from using the lessthan character (<) when entering data into forms. What is it trying to prevent? A. Logic bomb B. Cross-site scripting C. Fuzzing D. SQL injection

Question 21 While analyzing an application log, you discover several entries where a user Question 21 While analyzing an application log, you discover several entries where a user has entered the following command into a webbased form: …/etc/passwd. What does this indicate? A. Fuzzing B. Kiting C. Command injection attack D. Do. S

Question 22 In regards to secure coding practices, why is input validation important? A. Question 22 In regards to secure coding practices, why is input validation important? A. It mitigates buffer overflow attacks. B. It makes the code more readable. C. It provides an application configuration baseline. D. It meets gray box testing standards.

Question 24 Which of the following steps should follow the deployment of a patch? Question 24 Which of the following steps should follow the deployment of a patch? A. Antivirus and anti-malware deployment B. Audit and verification C. Fuzzing and exploitation D. Error and exception handling

Question 25 A security administrator is observing congestion on the firewall interfaces and a Question 25 A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway? A. Cross-site scripting B. SPIM C. Client-side D. DDo. S

Question 26 Which of the following tools would Matt, a security administrator, MOST likely Question 26 Which of the following tools would Matt, a security administrator, MOST likely use to analyze a malicious payload? A. Vulnerability scanner B. Fuzzer C. Port scanner D. Protocol analyzer

Question 27 Which of the following application security testing techniques is implemented when an Question 27 Which of the following application security testing techniques is implemented when an automated system generates random input data? A. Fuzzing B. XSRF C. Hardening D. Input validation

Question 28 Which of the following application security testing techniques is implemented when an Question 28 Which of the following application security testing techniques is implemented when an automated system generates random input data? A. Fuzzing B. XSRF C. Hardening D. Input validation

Question 30 Which of the following BEST describes a protective countermeasure for SQL injection? Question 30 Which of the following BEST describes a protective countermeasure for SQL injection? A. Eliminating cross-site scripting vulnerabilities B. Installing an IDS to monitor network traffic C. Validating user input in web applications D. Placing a firewall between the Internet and database servers

Question 31 Which of the following BEST describes a protective countermeasure for SQL injection? Question 31 Which of the following BEST describes a protective countermeasure for SQL injection? A. XSS B. SQL injection C. Directory traversal D. Packet sniffing

Question 32 When checking his webmail, Matt, a user, changes the URL’s string of Question 32 When checking his webmail, Matt, a user, changes the URL’s string of characters and is able to get into another user’s inbox. This is an example of which of the following? A. Header manipulation B. SQL injection C. XML injection D. Session hijacking

Question 33 Which of the following is the below pseudo-code an example of? IF Question 33 Which of the following is the below pseudo-code an example of? IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT A. Buffer overflow prevention B. Input validation C. CSRF prevention D. Cross-site scripting prevention

Question 34 After Matt, a user, enters his username and password at the login Question 34 After Matt, a user, enters his username and password at the login screen of a web enabled portal, the following appears on his screen: ‘Please only use letters and numbers on these fields’ Which of the following is this an example of? A. Proper error handling B. Proper input validation C. Improper input validation D. Improper error handling

Question 35 Matt, a developer, recently attended a workshop on a new application. The Question 35 Matt, a developer, recently attended a workshop on a new application. The developer installs the new application on a production system to test the functionality. Which of the following is MOST likely affected? A. Application design B. Application security C. Initial baseline configuration D. Management of interfaces

Question 36 An administrator notices an unusual spike in network traffic from many sources. Question 36 An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that: A. it is being caused by the presence of a rogue access point. B. it is the beginning of a DDo. S attack. C. the IDS has been compromised. D. the internal DNS tables have been poisoned.

Question 37 Matt, a security administrator, is receiving reports about several SQL injections and Question 37 Matt, a security administrator, is receiving reports about several SQL injections and buffer overflows through his company’s website. Which of the following would reduce the amount of these attack types? A. Antivirus B. Anti-spam C. Input validation D. Host based firewalls

Question 38 Mike, a user, receives an email from his grandmother stating that she Question 38 Mike, a user, receives an email from his grandmother stating that she is in another country and needs money. The email address belongs to his grandmother. Which of the following attacks is this? A. Man-in-the-middle B. Spoofing C. Relaying D. Pharming

Question 39 Which of the following sets numerous flag fields in a TCP packet? Question 39 Which of the following sets numerous flag fields in a TCP packet? A. XMAS attack B. DNS poisoning C. SYN flood D. ARP poisoning

Question 40 In planning for a firewall implementation, Pete, a security administrator, needs a Question 40 In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns? A. Syslog B. Protocol analyzer C. Proxy server D. Firewall

Question 41 Which of the following application attacks is used to gain access to Question 41 Which of the following application attacks is used to gain access to SEH? A. Cookie stealing B. Buffer overflow C. Directory traversal D. XML injection

Question 42 Which of the following application attacks is used to gain access to Question 42 Which of the following application attacks is used to gain access to SEH? A. Cookie stealing B. Buffer overflow C. Directory traversal D. XML injection

Question 43 Which of the following does a second authentication requirement mitigate when accessing Question 43 Which of the following does a second authentication requirement mitigate when accessing privileged areas of a website, such as password changes or user profile changes? A. Cross-site scripting B. Cookie stealing C. Packet sniffing D. Transitive access

Question 44 A buffer overflow can result in which of the following attack types? Question 44 A buffer overflow can result in which of the following attack types? A. DNS poisoning B. Zero-day C. Privilege escalation D. ARP poisoning

Question 45 Which of the following BEST describes a directory traversal attack? A. A Question 45 Which of the following BEST describes a directory traversal attack? A. A malicious user can insert a known pattern of symbols in a URL to access a file in another section of the directory. B. A malicious user can change permissions or lock out user access from a webroot directory or subdirectories. C. A malicious user can delete a file or directory in the webroot directory or subdirectories. D. A malicious user can redirect a user to another website across the Internet.

Question 46 In her morning review of new vendor patches, a security administrator has Question 46 In her morning review of new vendor patches, a security administrator has identified an exploit that is marked as critical. Which of the following is the BEST course of action? A. The security administrator should wait seven days before testing the patch to ensure that the vendor does not issue an updated version, which would require reapplying the patch. B. The security administrator should download the patch and install it to her workstation to test whether it will be able to be applied to all workstations in the environment. C. The security administrator should alert the risk management department to document the patch and add it to the next monthly patch deployment cycle. D. The security administrator should download the patch to the test network, apply it to affected systems, and evaluate the results on the test systems.

Question 47 In Sara, an IT security technician, has identified security weaknesses within her Question 47 In Sara, an IT security technician, has identified security weaknesses within her company’s code. Which of the following is a common security coding issue? A. Input validation B. Application fuzzing C. Black box testing D. Vulnerability scanning

Question 48 Which of the following is an application security coding problem? A. Error Question 48 Which of the following is an application security coding problem? A. Error and exception handling B. Patch management C. Application hardening D. Application fuzzing

Question 49 An IT security technician needs to establish host based security for company Question 49 An IT security technician needs to establish host based security for company workstations. Which of the following will BEST meet this requirement? A. Implement IIS hardening by restricting service accounts. B. Implement database hardening by applying vendor guidelines. C. Implement perimeter firewall rules to restrict access. D. Implement OS hardening by applying GPOs.

Question 50 Which of the following can BEST help prevent crosssite scripting attacks and Question 50 Which of the following can BEST help prevent crosssite scripting attacks and buffer overflows on a production system? A. Input validation B. Network intrusion detection system C. Anomaly-based HIDS D. Peer review