8. A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop’s user on the website the user is logged into. What kind of attack is this?
9. Which one of these shows why a DNS cache poisoning attack is dangerous?
- It lets attackers access a site’s database and cause damage by using database commands.
- It allows an attacker to remotely control your computer.
- It’s not actually dangerous.
- It allows an attacker to redirect targets to malicious web servers.
10. Which of the following is true of a DDoS attack?
- This type of attack is used to steal a token and hijack a session.
- The attack is used to redirect web traffic to sites run by attackers.
- The attack traffic comes from lots of different hosts.
- The attack comes from one source sending a flood of SYN packets.
12. Which of these describes a rogue AP attack?
- An attacker uses a form of malware to perform admin level modification to a victim’s operating system.
- A user tries to get to a service, but the service can’t be reached because an attacker has overloaded it with packets
- An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network.
- Company employees think they are connecting to the company network, but they are connecting to a fake, identical network controlled by an attacker.