ITN-260 Chapter 3

25 July 2022
4.7 (114 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
When TCP/IP was developed, the host table concept was expanded into a hierarchical name system for matching computer names and numbers using this service: a. SML b. HTML c. DNS d. ​ARP
answer
c. DNS
question
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? a. Phishing b. DNS marking c. DNS overloading d. DNS poisoning
answer
DNS poisoning
question
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database? a. whatever; AND email IS NULL; -- b. whatever" AND email IS NULL; -- c. whatever' AND email IS NULL; -- d. whatever AND email IS NULL; --
answer
whatever' AND email IS NULL; -
question
What language below is designed to display data, with a primary focus on how the data looks? a. SML b. HTML c. SGML d. XML
answer
HTML
question
Because the XSS is a widely known attack, the number of Web sites that are vulnerable is very small. False True.
answer
True
question
Which type of attack below is similar to a passive man-in-the-middle attack? a. hijacking b. denial c. replay d. buffer overflow
answer
replay
question
Although traditional network security devices can block traditional network attacks, they cannot always block Web application attacks. True False
answer
True
question
What language below is used to view and manipulate data that is stored in a relational database? a. SML b. HTML c. SQL d. SGML
answer
SQL
question
On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred? a. ​Man-in-the-middle b. ​Privilege escalation c. ​DNS cache poisoning d. ​ARP poisoning
answer
Privilege escalation
question
Select below the string of characters that can be used to traverse up one directory level from the root directory: a. ./ b. %20/ c. ;/ d. xxs../
answer
../
question
How can an attacker substitute a DNS address so that a computer is automatically redirected to another device? a. Phishing b. DNS marking c. DNS overloading d. DNS poisoning
answer
DNS poisoning
question
XSS attacks occur when an attacker takes advantage of web applications that accept user input without validating it and then present it back to the user.​ True False
answer
True
question
What portion of the HTTP packet consists of fields that contain information about the characteristics of the data being transmitted? a. SSL header b. HTTP header c. XML header d. HTML header
answer
HTTP header
question
The default root directory of the Microsoft Internet Information Services (IIS) Web server is located at which directory below? a. C:wwwroot b. /var/www c. C:Inetpub wwwroot d. /var/html
answer
C:Inetpub wwwroot
question
Choose the SQL injection statement example below that could be used to find specific users: a. whatever' OR full_name = '%Mia%' b. whatever' OR full_name equals '%Mia%' c. whatever' OR full_name LIKE '%Mia%' d. whatever' OR full_name IS '%Mia%'
answer
whatever' OR full_name LIKE '%Mia%'
question
What language below is for the transport and storage of data, with the focus on what the data is? a. SML b. HTML c. SGML d. XML
answer
XML
question
Which SQL injection statement can be used to erase an entire database table? a. whatever'; DELETE TABLE members; -- b. whatever'; DROP TABLE members; -- c. whatever'; RENAME TABLE members; -- d. whatever'; UPDATE TABLE members; --
answer
whatever'; DROP TABLE members; --
question
Which SQL statement represents a SQL injection attempt to determine the names of different fields in a database? a. whatever; AND email IS NULL; -- b. whatever' AND email IS NULL; -- c. whatever" AND email IS NULL; -- d. whatever AND email IS NULL; --
answer
whatever' AND email IS NULL; --
question
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as: a. Session blocking b. Session spoofing c. Session hijacking d. Session replay
answer
Session hijacking
question
HTML uses which option below within embedded brackets (< >) causing a web browser to display text in a specific format? a. taps b. tags c. blocks d. marks
answer
tags