8. A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop’s user on the website the user is logged into. What kind of attack is this?
- A ransomware attack.
- A rogue AP attack
- A session hijacking attack
- A trojan attack.
9. Which one of these shows why a DNS cache poisoning attack is dangerous?
- It lets attackers access a site’s database and cause damage by using database commands.
- It allows an attacker to remotely control your computer.
- It’s not actually dangerous.
- It allows an attacker to redirect targets to malicious web servers.
10. Which of the following is true of a DDoS attack?
- This type of attack is used to steal a token and hijack a session.
- The attack is used to redirect web traffic to sites run by attackers.
- The attack traffic comes from lots of different hosts.
- The attack comes from one source sending a flood of SYN packets.
11. Which one of the following results from a denial-of-service attack?
- Service unreachable
- Email address theft
- Data destruction
- Malware infection
12. Which of these describes a rogue AP attack?
- An attacker uses a form of malware to perform admin level modification to a victim’s operating system.
- A user tries to get to a service, but the service can’t be reached because an attacker has overloaded it with packets
- An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network.
- Company employees think they are connecting to the company network, but they are connecting to a fake, identical network controlled by an attacker.