Online Book Reader

Home Category

CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [65]

By Root 364 0
guess or locate sequence numbers in order to initiate a session hijacking attack. Sequence numbers are used to sequentialize packets and permit a receiving station to reassemble data correctly.

Understand the dangers of session hijacking. Most computers are vulnerable to session hijacking attacks, and available countermeasures aren't always successful. Confidential and important information, such as passwords, account information, and credit card numbers can be obtained through session-hijacking attacks.

Know the countermeasures to session hijacking. Use encryption, strong authentication, and secure protocols; limit incoming connections, minimize remote access connections, educate employees, and maintain unique usernames and passwords for different accounts.

Review Questions

1. Which is a method to prevent Denial of Service attacks?

A. Static routing

B. Traffic filtering

C. Firewall rules

D. Personal firewall

2. What is a zombie?

A. A compromised system used to launch a DDoS attack

B. The hacker's computer

C. The victim of a DDoS attack

D. A compromised system that is the target of a DDoS attack

3. The Trinoo tool uses what protocol to perform a DoS attack?

A. TCP

B. IP

C. UDP

D. HTTP

4. What is the first phase of a DDoS attack?

A. Intrusion

B. Attack

C. DoS

D. Finding a target system

5. Which tool can run eight different types of DoS attacks?

A. Ping of Death

B. Trinoo

C. Targa

D. TFN2K

6. What is a smurf attack?

A. Sending a large amount of ICMP traffic with a spoofed source address

B. Sending a large amount of TCP traffic with a spoofed source address

C. Sending a large number of TCP connection requests with a spoofed source address

D. Sending a large number of TCP connection requests

7. What is a LAND attack?

A. Sending oversized ICMP packets

B. Sending packets to a victim with a source address set to the victim's IP address

C. Sending packets to a victim with a destination address set to the victim's IP address

D. Sending a packet with the same source and destination address

8. What is the Ping of Death?

A. Sending packets that, when reassembled, are too large for the system to understand

B. Sending very large packets that cause a buffer overflow

C. Sending packets very quickly to fill up the receiving buffer

D. Sending TCP packet with the fragment offset out of bounds

9. How does a Denial of Service attack work?

A. Cracks passwords, causing the system to crash

B. Imitates a valid user

C. Prevents a legitimate user from using a system or service

D. Attempts to break the authentication method

10. What is the goal of a Denial of Service attack?

A. Capture files from a remote system

B. Incapacitate a system or network

C. Exploit a weakness in the TCP/IP stack

D. Execute a Trojan using the hidden shares

11. Which of the following tools is only for Sun Solaris systems?

A. Juggernaut

B. T-Sight

C. IP Watcher

D. TTYWatcher

12. What is a sequence number?

A. A number that indicates where a packet falls in the data stream

B. A way of sending information from the sending to the receiving station

C. A number that the hacker randomly chooses in order to hijack a session

D. A number used in reconstructing UDP session

13. What type of information can be obtained during a session-hijacking attack? (Choose all that apply.)

A. Passwords

B. Credit card numbers

C. Confidential data

D. Authentication information

14. Which of the following is essential information to a hacker performing a session-hijacking attack?

A. Session ID

B. Session number

C. Sequence number

D. Source IP address

15. Which of the following is a session-hijacking tool that runs on Linux operating systems?

A. Juggernaut

B. Hunt

C. TTYWatcher

D. TCP Reset Utility

16. Which of the following is the best countermeasure to session hijacking?

A. Port filtering firewall

B. Encryption

C. Session monitoring

D. Strong passwords

17. Which of the following best describes sniffing?

A. Gathering packets to locate IP addresses, in order to initiate a session-hijacking attack

B. Analyzing packets

Return Main Page Previous Page Next Page

®Online Book Reader