Attack Methods & Defenses | Test-1
This section focuses on identifying potential attack vectors and evaluating the system’s resilience against various types of cyberattacks. Tests include simulating common attacks like SQL injection, cross-site scripting (XSS), denial-of-service (DoS), brute-force attacks, and man-in-the-middle (MITM) attacks. The goal is to assess the effectiveness of implemented security controls and defenses, such as input validation, encryption, intrusion detection systems (IDS), firewalls, and rate limiting. This section also evaluates the system’s ability to detect, prevent, and respond to active attacks, ensuring comprehensive protection against potential threats.
1 / 21
1. _________ refers to the preliminary phase of an attack where an attacker collects information about a target system, network, or organization. It involves gathering data on system architecture, network topology, potential vulnerabilities, and other details to plan and launch a targeted cyber-attack. Choose the correct term from below.
In information security, reconnaissance refers to the preliminary phase of an attack where an attacker collects information about a target system, network, or organization. It involves gathering data on system architecture, network topology, potential vulnerabilities, and other details to plan and launch a targeted Cyberattack. Reconnaissance can be passive, involving information obtained from publicly available sources, or active, where the attacker engages with the target to gather specific data. This phase helps attackers identify weaknesses and tailor their strategies for subsequent stages of the attack.
2 / 21
2. ______ refers to the automated process of systematically browsing and indexing web pages on the internet. They are also known as web crawlers or bots, navigate through websites, following links to collect information for search engines or other purposes such as data analysis or reconnaissance. Choose the correct term from below.
Web spidering, also known as web crawling, is like having a tireless, digital librarian scurry across the vast web, reading every page and meticulously filing it away for easy searching. It’s the process by which search engines and other tools discover and organize the massive amount of information available online.
3 / 21
3. In a _______ attack, an unauthorized party intercepts and maliciously reuses captured data, often previously valid authentication credentials or communication, to gain unauthorized access or manipulate systems. The attacker resends the intercepted data to trick the system into accepting it as legitimate, bypassing security controls. Choose the correct term from below.
In a replay attack, which is a type of man-in-the-middle attack, an attacker sniffs communications being sent on a channel in order to intercept them and resend them while still appearing to be genuine messages. The replay attack is particularly dangerous since the attacker can trick the recipient into believing that the message they have just received is valid without ever decrypting it.
4 / 21
4. In an ___________, an attacker feeds a program with improper input. An interpreter will process this input as part of a command or query. This in turn modifies how that software is run. Choose the correct term from below.
An injection attack is a type of security threat where malicious code or commands are inserted into data inputs, tricking a system into executing unintended actions. This can lead to unauthorized access, data manipulation, or other security breaches. Common examples include SQL injection and cross-site scripting (XSS) attacks.
5 / 21
5. As a programmer, what do you do to prevent injection attacks?
Enforcing, strict input validation and also using parameterized queries for dynamic data and also enforcing strict authorization controls to restrict user access to specific resources can mitigate injection attacks.
6 / 21
6. _________ attack refers to the unauthorized modification of browser cookies. In this type of attack, an attacker manipulates the content of a cookie to gain unauthorized access, impersonate a user, bypass authentication, or perform other malicious actions. Choose the correct term from below
In a cookie poisoning attack, the attacker modifies HTTP cookies’ contents before the user’s browser sends them to a web site. Attackers may use cookie hijacking as a prelude to cookie poisoning so they can access cookie content before altering it, however this is not always required.
Cookie poisoning attacks are fatal because they allow attackers to use the data stored inside cookies to gain unauthorized access to users’ accounts or to steal their identities.
7 / 21
7. _______ is a software testing technique that involves providing unexpected or random input to a program to discover vulnerabilities, bugs, or unexpected behaviors. It helps identify security weaknesses, particularly in the context of input validation, by systematically testing how a program responds to various inputs. Choose the correct term from below
The correct answer is Fuzzing
Fuzzing is a software testing technique where unexpected, random, or invalid inputs are provided to a program to identify vulnerabilities, bugs, or security weaknesses. The goal is to see how the program reacts to these inputs, potentially uncovering issues such as crashes, buffer overflows, or input validation errors that may lead to security risks.
Explanation of Incorrect Options:
8 / 21
8. A _______ is a type of password cracking technique where an attacker systematically tries all words or phrases from a predefined list to gain unauthorized access to user accounts or systems. Choose the correct term from below
A dictionary attack entails inputting every word in a dictionary as a password in order to gain access to a password-protected computer, network, or other IT resource. A dictionary attack can also be used to try to decipher a communication or document that has been encrypted.
9 / 21
9. What technique involves an attacker making repeated login attempts using various passwords to gain unauthorized access?
A brute force attack is a hacking technique that makes use of trial and error to break encryption keys, passwords, and login credentials. It is a straightforward but effective strategy for getting unauthorized access to user accounts, company systems, and networks. Until they discover the proper login information, the hacker tries a variety of usernames and passwords, frequently utilizing a computer to test a wide range of combinations.
10 / 21
10. Which of the following is a type of brute-force attack?
All mentioned are different types of attacks
Each of these techniques falls under the category of brute-force attacks because they involve automated attempts to guess or verify passwords or credentials.
11 / 21
11. _________ is a type of cyber attack where attackers use large sets of usernames and passwords obtained from previous data breaches to gain unauthorized access to user accounts on various online platforms. The attackers exploit the tendency of users to reuse passwords across multiple sites.
Credential stuffing is like a digital pickpocket rummaging through a lost wallet of passwords, trying them on every door they find. It’s a cyberattack where stolen logins (usernames and passwords) from one website are used to try breaking into accounts on other websites, hoping some users reuse the same credentials everywhere.
12 / 21
12. What type of attack involves an attacker intercepting communication between two parties to gain unauthorized access?
A Man-in-the-Middle (MitM) attack is a security breach where an unauthorized third party intercepts and potentially alters communication between two parties without their knowledge. The attacker can eavesdrop on or manipulate the exchanged data, compromising the confidentiality and integrity of the communication.
13 / 21
13. Which attack aims to overwhelm a system by flooding it with illegitimate traffic?
The correct answer is: Distributed Denial of Service (DDoS) Attack
A Distributed Denial of Service (DDoS) attack aims to overwhelm a system by flooding it with illegitimate traffic, often coming from multiple sources (distributed). The goal is to exhaust the target’s resources, such as bandwidth, CPU, or memory, making the system unavailable to legitimate users.
14 / 21
14. Which of the following security threats involves exploiting vulnerabilities in database queries and potentially gaining unauthorized access to a database?
SQL queries that can read or modify database data are injected by the attacker. Advanced SQL Injection attacks allow the attacker to write arbitrary files to the server and even run OS commands using SQL commands. This might compromise the entire system.
Threats: Authentication bypass in login pages, data loss, compromised data integrity
15 / 21
15. Which attack involves an attacker sending malicious emails with the goal of tricking recipients into revealing sensitive information?
A phishing attack is a cyber threat that involves deceptive attempts to trick individuals into revealing sensitive information, such as passwords or financial details, by posing as a trustworthy entity through fake emails, messages, or websites.
16 / 21
16. Which of the following describes an application’s vulnerability to a Man-in-the-Middle (MITM) attack the most?
Improper session management is a vulnerability because it can lead to unauthorized access to user accounts and sensitive information, allowing attackers to hijack valid sessions or manipulate user sessions without proper authentication.
17 / 21
17. In which type of the attack, a hacker can force a web server to deliver web pages that they are not authorized to view. Choose the correct term from below?
A hacker can force a web server to deliver web pages that they are not authorized to view by changing specific elements of a URL.
Malicious actors useย URL manipulationย tactics to commit directory traversal attacks by altering the paths of a targeted URL.
Dynamic websites serve pages based on URL parameters, malicious users can manipulate the URL with unexpected values. Vulnerable web applications can render pages which the user is not authorized to.
18 / 21
18. Which attack method targets software dependencies with known vulnerabilities to compromise an application?
A supply chain attack is a cyber-attack strategy where attackers compromise a target organization by exploiting vulnerabilities in its supply chain. Instead of directly targeting the organization, attackers focus on infiltrating third-party suppliers, vendors, or service providers connected to the target. By compromising the supply chain, attackers can introduce malicious elements, backdoors, or vulnerabilities into the products or services delivered to the target, leading to potential security breaches, data theft, or system compromises.
19 / 21
19. Which type of malware replicates itself across a network, infecting vulnerable devices?
A worm is a self-replicating type of malware that spreads independently across computer networks without requiring user interaction. Worms often exploit vulnerabilities in software or network protocols to infect and propagate to other connected systems. They can cause widespread and rapid infections, affecting multiple devices and networks.
20 / 21
20. A newly discovered vulnerability in anย application would be considered as
The correct answer is: 0-day vulnerability
A 0-day vulnerability refers to a security flaw that is unknown to the software vendor or the public and has been discovered by attackers or researchers. The term “0-day” implies that there has been “zero days” since the discovery for the vendor to develop and release a patch, making it highly dangerous as attackers may exploit it before a fix is available.
21 / 21
21. Social engineering attacks are crafted to
Social engineering attacks manipulate human behavior through tactics like pretexting, phishing, baiting, impersonation, and emotional exploitation. Attackers gather information, create convincing scenarios, and exploit trust to trick individuals into disclosing sensitive information or performing actions that compromise security. These attacks leverage psychological tactics to exploit human vulnerabilities and are often carried out through deceptive communication methods.
Your score is
The average score is 61%
Restart Test
Related challenges :