Attack Methods & Defenses | Test-2

0%
0

Attack Methods & Defenses | Test-2

This section focuses on identifying potential attack vectors and evaluating the system’s resilience against various types of cyberattacks. Tests include simulating common attacks like SQL injection, cross-site scripting (XSS), denial-of-service (DoS), brute-force attacks, and man-in-the-middle (MITM) attacks. The goal is to assess the effectiveness of implemented security controls and defenses, such as input validation, encryption, intrusion detection systems (IDS), firewalls, and rate limiting. This section also evaluates the system’s ability to detect, prevent, and respond to active attacks, ensuring comprehensive protection against potential threats.

1 / 29

1. A _______ is a type of malicious software or code that is designed to execute a harmful action when specific conditions are met, such as a particular date or event. It is typically intended to damage or disrupt a computer system or network.

2 / 29

2. Among the below types of attacks, identify the web application attack in which attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages that other users view.

3 / 29

3. What type of Cross Site Scripting (XSS) vulnerability allows malicious scripts to be executed in the context of another user’s browser?

4 / 29

4. A _____________ attack is a type of cyber attack where an attacker tricks a user’s browser into unknowingly submitting a request on a website on which the user is authenticated. This can lead to unauthorized actions being performed on behalf of the user without their consent.

5 / 29

5. A well-known and common attack type against web servers and web applications is __________.

6 / 29

6. A buffer overflow attack aims to inject malicious code by exceeding the allocated memory buffer. Which programming language is particularly vulnerable to such attacks?

7 / 29

7. Using which security flaw an attacker to access any files on the server hosting an application. This could comprise critical operating system files, back-end system login information, and application code and data.

8 / 29

8. According to OWASP, The __________ attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.

9 / 29

9. Using which of the methods session hijacking cannot be performed?

10 / 29

10. How to By-pass client-side controls for HTML form validation?

11 / 29

11. In a Zero-Day Attack, what does “Zero-Day” refer to?

12 / 29

12. A _______ attack circumvents the system’s usual security measures to gain access to a computer system or encrypted information. An application, operating system, or data may have it created by a developer that allows access for debugging or other purposes. Attackers might detect it and use if for nefarious purposes. Choose the correct term from below?

13 / 29

13. Is it a good practice to reply to users during authentication by sending them detailed error messages?

14 / 29

14. What is website defacement?

15 / 29

15. Which attack involves modifying the Hosts file or DNS server to redirect a legitimate website’s traffic to a malicious website?

16 / 29

16. What web application vulnerability allows attackers to steal session cookies for unauthorized access?

17 / 29

17. A unique characteristic of a polymorphic virus is it.

18 / 29

18. _______ is a security vulnerability that allows an attacker to make requests to internal resources, potentially leading to unauthorized access, data exposure, or remote code execution on a server. This occurs when an application processes user-supplied URLs and allows attackers to forge requests to internal or external resources. Choose the correct term from below?

19 / 29

19. Which option works the best to prevent social engineering attacks?

20 / 29

20. Which of the following technique is used to identify the type of web server during reconnaissance phase.

21 / 29

21. Which of the following is a type of offline attack?

22 / 29

22. What is the most typical DoS attack warning sign?

23 / 29

23. _________ implements policy, preventing users from acting outside of their designated permissions. Failures generally result in illegal information disclosure, modification, or destruction of all data, or the performance of a business function beyond the user’s capabilities.

24 / 29

24. Which of the following is a common Access control violation:

25 / 29

25. Which of the following describes the application of a blind SQL injection attack?

26 / 29

26. The use of “questions and answers” in a password recovery workflow is forbidden by the OWASP Top 10, the OWASP ASVS, and NIST 800-63b. Since other people could know the answers, questions and answers cannot be considered reliable identification proof. For this reason, they are forbidden. Such code ought to be taken out and swapped out for a safer layout. What kind of flaw is this?

27 / 29

27. _________ is a highly complex and focused cyberattack in which an unauthorized user gains access to a network and stays hidden for a long time.

28 / 29

28. Which of the following mechanism is vulnerable to Broken authentication

29 / 29

29. What attack leverages unknown vulnerabilities in software for immediate exploitation, often requiring no user interaction?

Your score is

The average score is 0%

0%


Related challenges :