Home » Cyber Security » Understanding Attack Vectors
Que.Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system. a. authentications b. breaches c. integrations d. associations
Que._______________ is done only after the target user has connected to the server. a. Server hacking b. Banner grabbing c. Cracking d. Hijacking
Que.In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. a. phishing b. spoofing c. hijacking d. vishing
Que.There are ___________ types of session hijacking. a. 2 b. 3 c. 4 d. 5
Que.With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth. a. network session hijacking b. passive session hijacking c. active session hijacking d. social-networking session hijacking
Show Answer passive session hijacking
Que.In an _________________ attack, an attacker finds an active session & takes over that session. a. network session hijacking b. passive session hijacking c. active session hijacking d. social-networking session hijacking
Que.Session hijacking takes place at ____________ number of levels. a. five b. four c. three d. two
Que.The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. a. network level b. physical level c. application level d. data level
Que.Which of the following example do not comes under network level session hijacking. a. TCP/IP Hijacking b. RST Hijacking c. Domain Hijacking d. Blind Hijacking
Que.In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session. a. network level b. physical level c. application level d. data level