Chapter 1
- In what type of exploitation does an attacker steal a valid session ID and use it to get
into the system to extract data?
- Impersonation
- A man-in-the-middle attack
- Spoofing
*c. Session hijacking
- In which attack method does an attacker use a sniffer to track down a conversation
between two users?
*a. Man-in-the-middle
- Code injection
- IP spoofing
- Network tapping
- At what layer do routers allow the datagram to hop from the source to the destination,
one hop at a time?
- data link
- transport
- application
*b. network
- Which layer communicates with the physical hardware and is responsible for the
delivery of signals from the source to the destination over a physical communication platform?
*a. data link
- network
- transport
- application
- In which type of attack, does the attacker predict the sequence numbers that a
victimized host sends in order to create a connection that appears to originate from the host?
*a. blind hijacking
- TCP spoofing
- IP spoofing
(Ethical Hacking and Countermeasures, Web Applications and Data Servers, 2e EC-Council) (Test Bank, Correct Answer are marked with*) 1 / 2
- source routing
- Which of the following is a process that allows the sender to specify a specific route
for an IP packet to take to the destination?
- IP spoofing
- Blind hijacking
- TCP spoofing
*d. Source routing
- What is the correct order of phases of a hijack session?
- track the packet, synchronize the connection, inject the packet
- synchronize the connection, track the packet, inject the packet
- desynchronize the connection, track the connection, inject the packet
*b. track the connection, desynchronize the connection, inject the packet
- Which type of hijacking is a hacking technique that uses spoofed packets to take over
a connection between a victim and a target machine?
- ACK
- Blind
- Network-level
*c. TCP/IP
- In which form of TCP/IP hijacking can the hacker can reset the victim's connection if
it uses an accurate acknowledgment number?
- ACK
- Blind
- IP
*d. RST
- Which of the following is a best practice to try to prevent session hijacking?
- Use remote access extensively
- Use an unencrypted protocol
- Use clear text for authentication
- / 2
*c. Limit incoming connections