CompTIA Security+ 2.4 Threats, Attacks, and Vulnerabilities – Application Attacks

Posted by:

|

On:

|

Application Attacks

1 / 25

An attacker exploits a vulnerability in a web application where user input is directly included in the application’s output without proper encoding. This allows the attacker to inject malicious scripts that are executed by other users’ browsers. What type of attack is this?

2 / 25

A security team notices that their web server is receiving a large number of HTTP requests, each with a unique, randomly generated parameter. These requests are causing the server to perform resource-intensive database lookups, leading to slowdowns. What type of attack is this MOST likely to be?

3 / 25

An attacker has gained access to a user’s session cookie for a web application. The attacker is now able to perform actions on the web application as if they were the legitimate user. What type of attack does this scenario describe?

4 / 25

A company’s DNS server is experiencing an unusually high volume of traffic. Analysis shows that the server is receiving a large number of DNS queries for a non-existent domain, with each query having a different source IP address. The responses are much larger than the queries. Which of the following attacks is MOST likely occurring?

5 / 25

An attacker sends a series of carefully fragmented IP packets to a target system. When the system attempts to reassemble these packets, it crashes due to a flaw in its IP fragmentation reassembly process. What type of attack is this?

6 / 25

An attacker exploits a vulnerability in a web application where user-supplied input is used to construct a filename for inclusion. By manipulating this input, the attacker is able to include and execute arbitrary files on the server. What type of attack is this?

7 / 25

An attacker exploits a vulnerability in a web application that allows them to access files and directories that are outside of the web server’s root directory. This gives the attacker access to sensitive system files. What type of attack is this?

8 / 25

An attacker sets up a malicious Wi-Fi access point with the same SSID as a legitimate network. When users connect to this rogue access point, the attacker can intercept and manipulate their network traffic. What type of attack is this?

9 / 25

A web application vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users. These scripts execute in the context of the victim’s browser, potentially stealing session tokens or performing actions on behalf of the victim. What type of attack is this?

10 / 25

An organization’s network administrator notices that the company’s DNS server is resolving domain names to incorrect IP addresses. Upon further investigation, it’s discovered that the DNS cache has been altered. What type of attack has likely occurred?

11 / 25

An attacker sends a large number of UDP packets to random ports on a target system. The system becomes overwhelmed trying to process these packets and determine which application should receive them, leading to a degradation of service. What type of attack is this?

12 / 25

An attacker exploits a vulnerability in a web application where user input is directly included in an HTTP response header without proper encoding. This allows the attacker to inject newline characters and create additional HTTP headers, potentially leading to HTTP response splitting. What type of attack is this?

13 / 25

An attacker exploits a vulnerability in a web application where user input is directly used to construct database queries. By manipulating this input, the attacker is able to execute arbitrary SQL commands on the database. What type of attack is this?

14 / 25

An attacker sends a large number of SYN packets to a server, but never completes the TCP three-way handshake. This causes the server to allocate resources for each half-open connection, eventually exhausting its capacity to handle new connections. What is this type of attack called?

15 / 25

An attacker exploits a vulnerability in a web application that allows them to upload and execute malicious PHP code on the server. This gives the attacker the ability to run arbitrary commands on the server with the privileges of the web server process. What type of attack is this?

16 / 25

An attacker exploits a vulnerability in a web application that allows them to execute database queries directly. This gives the attacker the ability to read, modify, or delete data in the database. What type of attack is this?

17 / 25

An attacker sends a large number of ICMP echo request (ping) packets to a target network’s broadcast address, spoofing the source IP address to be that of the intended victim. All hosts on the target network then respond to the victim’s IP address, overwhelming it with traffic. What type of attack is this?

18 / 25

An attacker exploits a vulnerability in a web application where user-supplied input is directly included in LDAP queries without proper sanitization. This allows the attacker to manipulate LDAP statements and potentially gain unauthorized access to the LDAP directory. What type of attack is this?

19 / 25

An attacker exploits a vulnerability in a web application that processes XML input. By including a reference to an external entity in the XML, the attacker is able to read files on the server or make network connections to other systems. What type of attack is this?

20 / 25

A web application allows users to upload files to the server. An attacker uploads a file with a double extension (e.g., ‘image.jpg.php’). The server processes the file as a PHP script instead of an image, allowing the attacker to execute arbitrary code. What type of vulnerability does this scenario describe?

21 / 25

A security analyst discovers that an attacker has been able to execute arbitrary code on a web server by sending specially crafted input that exceeds the allocated buffer size. What type of vulnerability has the attacker exploited?

22 / 25

An attacker sends a series of malformed packets to a target system, causing it to crash or become unresponsive. The packets are designed to exploit a specific vulnerability in the target’s network stack or operating system. What type of attack is this?

23 / 25

A security team discovers that an attacker has been able to execute system commands on a web server by injecting malicious input into a form field that is passed directly to a system function. What type of vulnerability has the attacker exploited?

24 / 25

An attacker sends a single ICMP packet to a network broadcast address, causing all systems on the subnet to respond simultaneously to the spoofed source address. This overwhelms the victim’s system with a flood of ICMP responses. What is this type of attack called?

25 / 25

An attacker sends a crafted request to a web server, tricking it into making unintended requests to other internal systems on behalf of the attacker. This allows the attacker to bypass firewalls and access normally restricted systems. What type of attack is this?

Your score is

Exit