I Hate CBT's

View Original

How Can Injection Attacks Be Prevented Check All That Apply

Question: Phishing, baiting, and tailgating are examples of ________ attacks.

Malware

Password

Social engineering

Network

Answer: Social engineering

Question: An attacker could redirect your browser to a fake website login page using what kind of attack?

Injection attack

DNS cache poisoning attack

DDoS attack

SYN flood attack

Answer: DNS cache poisoning attack

Question: A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.

Injection

Password

Denial of Service

DNS Cache poisoning

Answer: Denial of Service

Question: The best defense against password attacks is using strong _______.

Firewall configs

Passwords

Encryption

Antimalware software

Answer: Passwords

Question: Which of these is an example of the confidentiality principle that can help keep your data hidden from unwanted eyes?

Preventing data loss

Making sure the data hasn’t been tampered with

Preventing an unwanted download

Protecting online accounts with password protection

Answer: Protecting online accounts with password protection

Question:

Answer: A vulnerability is a flaw in the code of an application that can be exploited.

An exploit takes advantage of bugs and vulnerabilities.

Question:

Answer: Blackhats are malicious. Whitehats exploit weakness to help mitigate threats.

Question: A hacker infected your computer to steal your Internet connection and used your machine’s resources to mine Bitcoin. What is the name of this kind of attack?

Ransomware

Adware

Spyware

A bot

Answer: A bot

Question:

Answer: A Rogue AP (Access Point) attack

Question: What can occur during a ping of death (POD) attack? Check all that apply.

A Denial-of-Service (DoS)

A buffer overflow

Baiting

Remote code execution

Answer: A Denial-of-Service (DoS)

A buffer overflow

Remote code execution