Hacking Wireless Networks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Which of the following techniques is used by an attacker to gain unauthorized access to a target network and remain undetected for a long period of time?

Advanced Persistent Threat

2
New cards

What is the TCP IP based protocol for exchanging management information between devices connected to a network?

SNMP

3
New cards

In which of the following types of injection attacks does an attacker exploit vulnerable form inputs, inject HTML code into a webpage, and change the website appearance?

HTML Injection

4
New cards

Which of the following is the most effective technique in identifying vulnerabilities or flaws in the web page code?

Code Analysis

5
New cards

Ensuring session tokens are not reused helps to prevent this attack

Session fixation

6
New cards

During a SQL Injection attack these characters can be used to trick the program into discarding SQL code fragments

comment characters

7
New cards

During this attack sensitive data is improperly obtained from the database

Information Disclosure

8
New cards

Choose all correct answers SQL Injection is a result of

Poor Programming Technique, Carefully crafted user input, lack of user input validation

9
New cards

Which of the following characters is most helpful to an attacker during an SQL injection attack?

Dashes

10
New cards

Which of the following is not a SQL injection countermeasure

Reduce complexity by granting maximum rights to database accounts.

11
New cards

Which of the following techniques is used to compromise session IDs, with an attacker intruding into an existing connection between systems a attempting to intercept the messages being transmitted?

Man in the middle attack

12
New cards

Which of the following is a technique used by an attacker masquerading as a trusted host to conceal their identity for hijacking browsers or gaining unauthorized access to a network?

IP Addresses spoofing

13
New cards

It may be possible to delete tables or change the database structure during a SQL Injection attack.

True

14
New cards

Predictable table names may make a SQL Injection attack easier to accomplish.

True (PT)

15
New cards

Which of the following is not a valid SQL command

Change