How Can Injection Attacks Be Prevented Check All That Apply
Question: Phishing, baiting, and tailgating are examples of ________ attacks.
Malware
Password
Social engineering
Network
Answer: Social engineering
Question: An attacker could redirect your browser to a fake website login page using what kind of attack?
Injection attack
DNS cache poisoning attack
DDoS attack
SYN flood attack
Answer: DNS cache poisoning attack
Question: A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.
Injection
Password
Denial of Service
DNS Cache poisoning
Answer: Denial of Service
Question: The best defense against password attacks is using strong _______.
Firewall configs
Passwords
Encryption
Antimalware software
Answer: Passwords
Question: Which of these is an example of the confidentiality principle that can help keep your data hidden from unwanted eyes?
Preventing data loss
Making sure the data hasn’t been tampered with
Preventing an unwanted download
Protecting online accounts with password protection
Answer: Protecting online accounts with password protection
Question:
Answer: A vulnerability is a flaw in the code of an application that can be exploited.
An exploit takes advantage of bugs and vulnerabilities.
Question:
Answer: Blackhats are malicious. Whitehats exploit weakness to help mitigate threats.
Question: A hacker infected your computer to steal your Internet connection and used your machine’s resources to mine Bitcoin. What is the name of this kind of attack?
Ransomware
Adware
Spyware
A bot
Answer: A bot
Question:
Answer: A Rogue AP (Access Point) attack
Question: What can occur during a ping of death (POD) attack? Check all that apply.
A Denial-of-Service (DoS)
A buffer overflow
Baiting
Remote code execution
Answer: A Denial-of-Service (DoS)
A buffer overflow
Remote code execution