Attack Methods & Defenses | Test-1

0%
1

Attack Methods & Defenses | Test-1

This section focuses on identifying potential attack vectors and evaluating the system’s resilience against various types of cyberattacks. Tests include simulating common attacks like SQL injection, cross-site scripting (XSS), denial-of-service (DoS), brute-force attacks, and man-in-the-middle (MITM) attacks. The goal is to assess the effectiveness of implemented security controls and defenses, such as input validation, encryption, intrusion detection systems (IDS), firewalls, and rate limiting. This section also evaluates the system’s ability to detect, prevent, and respond to active attacks, ensuring comprehensive protection against potential threats.

1 / 21

1. _________ refers to the preliminary phase of an attack where an attacker collects information about a target system, network, or organization. It involves gathering data on system architecture, network topology, potential vulnerabilities, and other details to plan and launch a targeted cyber-attack. Choose the correct term from below.

2 / 21

2. ______ refers to the automated process of systematically browsing and indexing web pages on the internet. They are also known as web crawlers or bots, navigate through websites, following links to collect information for search engines or other purposes such as data analysis or reconnaissance. Choose the correct term from below.

3 / 21

3. In a _______ attack, an unauthorized party intercepts and maliciously reuses captured data, often previously valid authentication credentials or communication, to gain unauthorized access or manipulate systems. The attacker resends the intercepted data to trick the system into accepting it as legitimate, bypassing security controls. Choose the correct term from below.

4 / 21

4. In an ___________, an attacker feeds a program with improper input. An interpreter will process this input as part of a command or query. This in turn modifies how that software is run. Choose the correct term from below.

5 / 21

5. As a programmer, what do you do to prevent injection attacks?

6 / 21

6. _________ attack refers to the unauthorized modification of browser cookies. In this type of attack, an attacker manipulates the content of a cookie to gain unauthorized access, impersonate a user, bypass authentication, or perform other malicious actions. Choose the correct term from below

7 / 21

7. _______ is a software testing technique that involves providing unexpected or random input to a program to discover vulnerabilities, bugs, or unexpected behaviors. It helps identify security weaknesses, particularly in the context of input validation, by systematically testing how a program responds to various inputs. Choose the correct term from below

8 / 21

8. A _______ is a type of password cracking technique where an attacker systematically tries all words or phrases from a predefined list to gain unauthorized access to user accounts or systems. Choose the correct term from below

9 / 21

9. What technique involves an attacker making repeated login attempts using various passwords to gain unauthorized access?

10 / 21

10. Which of the following is a type of brute-force attack?

11 / 21

11. _________ is a type of cyber attack where attackers use large sets of usernames and passwords obtained from previous data breaches to gain unauthorized access to user accounts on various online platforms. The attackers exploit the tendency of users to reuse passwords across multiple sites.

12 / 21

12. What type of attack involves an attacker intercepting communication between two parties to gain unauthorized access?

A Man-in-the-Middle (MitM) attack is a security breach where an unauthorized third party intercepts and potentially alters communication between two parties without their knowledge. The attacker can eavesdrop on or manipulate the exchanged data, compromising the confidentiality and integrity of the communication.

13 / 21

13. Which attack aims to overwhelm a system by flooding it with illegitimate traffic?

14 / 21

14. Which of the following security threats involves exploiting vulnerabilities in database queries and potentially gaining unauthorized access to a database?

15 / 21

15. Which attack involves an attacker sending malicious emails with the goal of tricking recipients into revealing sensitive information?

16 / 21

16. Which of the following describes an application’s vulnerability to a Man-in-the-Middle (MITM) attack the most?

17 / 21

17. In which type of the attack, a hacker can force a web server to deliver web pages that they are not authorized to view. Choose the correct term from below?

18 / 21

18. Which attack method targets software dependencies with known vulnerabilities to compromise an application?

19 / 21

19. Which type of malware replicates itself across a network, infecting vulnerable devices?

20 / 21

20. A newly discovered vulnerability in anย  application would be considered as

21 / 21

21. Social engineering attacks are crafted to

Your score is

The average score is 61%

0%


Related challenges :