Network Attacks

8. A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop’s user on the website the user is logged into. What kind of attack is this?

  • A ransomware attack.
  • A rogue AP attack
  • A session hijacking attack
  • A trojan attack.

9. Which one of these shows why a DNS cache poisoning attack is dangerous?

  • It lets attackers access a site’s database and cause damage by using database commands.
  • It allows an attacker to remotely control your computer.
  • It’s not actually dangerous.
  • It allows an attacker to redirect targets to malicious web servers.

10. Which of the following is true of a DDoS attack?

  • This type of attack is used to steal a token and hijack a session.
  • The attack is used to redirect web traffic to sites run by attackers.
  • The attack traffic comes from lots of different hosts.
  • The attack comes from one source sending a flood of SYN packets.

11. Which one of the following results from a denial-of-service attack?

  • Service unreachable
  • Email address theft
  • Data destruction
  • Malware infection

12. Which of these describes a rogue AP attack?

  • An attacker uses a form of malware to perform admin level modification to a victim’s operating system.
  • A user tries to get to a service, but the service can’t be reached because an attacker has overloaded it with packets
  • An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network.
  • Company employees think they are connecting to the company network, but they are connecting to a fake, identical network controlled by an attacker.

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply