Attack Methods & Defenses | Test-4

0%
0

Attack Methods & Defenses | Test-4

This section focuses on identifying potential attack vectors and evaluating the system’s resilience against various types of cyberattacks. Tests include simulating common attacks like SQL injection, cross-site scripting (XSS), denial-of-service (DoS), brute-force attacks, and man-in-the-middle (MITM) attacks. The goal is to assess the effectiveness of implemented security controls and defenses, such as input validation, encryption, intrusion detection systems (IDS), firewalls, and rate limiting. This section also evaluates the system’s ability to detect, prevent, and respond to active attacks, ensuring comprehensive protection against potential threats.

1 / 21

1. What is recommended to minimize the risk of including malicious components in software?

2 / 21

2. A zoo management on their website has a maximum of 10 guests before asking a deposit and offers group booking discounts. Attackers might use this flow as a threat model to see if they could quickly and easily reserve 300,000 guests across all zoos across the country, resulting in a huge loss of revenue. What kind of security issue is this?

3 / 21

3. You notice the following string in the URL bar while using your bank’s online services: “http://www.mybank.com/account?id=133911028389& DRamount=1123&CRamount=43” You notice that if you change the DRamount and CRamount values and submit the request, the data on the web page changes. What kind of vulnerability is present on this website?

4 / 21

4. Automatic database encryption is used by an application to encrypt credit card numbers in a database. But when this data is retrieved, it immediately decrypts, making it possible for a SQL injection vulnerability to retrieve credit card details in plain text. What type of security issue is this? Choose the right term?

5 / 21

5. What supply chain attack technique targets software dependencies with known vulnerabilities by injecting malicious code into upstream libraries or frameworks?

6 / 21

6. What of the following attack type can be applied on Web services?

The correct answer is “All of the above.”

Hereโ€™s why each attack type can be applied to web services:

  1. DoS or DDoS (Denial of Service or Distributed Denial of Service): These attacks overwhelm the web service with traffic, rendering it unavailable to legitimate users.
  2. Security Token Manipulation: Attackers can manipulate security tokens (e.g., JWTs) used for authentication or authorization in web services, potentially gaining unauthorized access.
  3. API Abuse: This involves exploiting web service APIs by sending malformed requests, excessive requests, or exploiting API vulnerabilities to extract data or disrupt service.

All of these are common attack vectors that target web services.

7 / 21

7. A zero-day attack exploits a previously unknown vulnerability in a popular software application. Which of the following is NOT a typical mitigation strategy for such attacks?

8 / 21

8. A user receives an email with a link to a fascinating web site while performing online banking via a web browser. When the user clicks the link, a new web browser session is launched, which displays a recent viral video. The user receives what appears to be an email from his bank the following business day, informing him that his bank account has been accessed from a foreign country. The email instructs the user to contact his bank to confirm the authorization of a recent funds transfer. What web browser-based security flaw was used to target the user?

9 / 21

9. Which of the following needs to be true in order for a tester to take advantage of a web application that is vulnerable to Cross-Site Request Forgery (CSRF)?

10 / 21

10. A packet sniffer captures network traffic. Which technology uses captured data to reconstruct the conversation’s content?

Deep packet inspection (DPI) is the technology that uses captured data to reconstruct the content of network conversations. DPI involves the analysis of the actual data payload within network packets, allowing for a detailed examination of the content, including protocols, applications, and even the specific data being transmitted.

11 / 21

11. Rebecca is capturing network traffic and intercepting passwords as they are transmitted to the authentication server. She intends to use those passwords in a future attack. What kind of attack is she planning?

12 / 21

12. Cross-site scripting (XSS) is a type of application security flaw that is commonly found in web applications. When a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information, what type of XSS vulnerability occurs?

13 / 21

13. In social engineering attacks, a proxy is used to __________.

14 / 21

14. Which of the following password cracking methods requires the most time and effort?

15 / 21

15. Typically, a man-in-the-browser attack is made possible by which method?

16 / 21

16. What tactic involves obfuscating malicious code within legitimate software or libraries to bypass traditional security controls?

17 / 21

17. What is the consequence of insufficient logging and monitoring in cybersecurity?

18 / 21

18. A fileless malware attack injects malicious code directly into memory, making it difficult to detect by traditional antivirus software. This technique is known as:

19 / 21

19. Which type of attack leverages insecure file upload functionalities to upload malicious files onto a web server, potentially for further exploitation?

20 / 21

20. A targeted cyber attack utilizes a zero-day exploit in a critical server application, followed by lateral movement and data exfiltration. This type of attack is often associated with:

21 / 21

21. Which group of hackers are highly skilled among the following:

Your score is

The average score is 0%

0%


Related challenges :