• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

1. In what type of exploitation does an attacker steal a valid session ID and use it to get

Testbanks Dec 30, 2025 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Chapter 1

  • In what type of exploitation does an attacker steal a valid session ID and use it to get
  • into the system to extract data?

  • Impersonation
  • A man-in-the-middle attack
  • *c. Session hijacking

  • Spoofing
  • In which attack method does an attacker use a sniffer to track down a conversation
  • between two users?

*a. Man-in-the-middle

  • Code injection
  • IP spoofing
  • Network tapping
  • At what layer do routers allow the datagram to hop from the source to the destination,
  • one hop at a time?

  • data link
  • *b. network

  • transport
  • application
  • Which layer communicates with the physical hardware and is responsible for the
  • delivery of signals from the source to the destination over a physical communication platform?

*a. data link

  • network
  • transport
  • application
  • In which type of attack, does the attacker predict the sequence numbers that a
  • victimized host sends in order to create a connection that appears to originate from the host?

*a. blind hijacking

  • TCP spoofing
  • IP spoofing
  • (Ethical Hacking and Countermeasures, Web Applications and Data Servers, 2e EC-Council) (Test Bank, Correct Answer are marked with*) 1 / 2

  • source routing
  • Which of the following is a process that allows the sender to specify a specific route
  • for an IP packet to take to the destination?

  • IP spoofing
  • Blind hijacking
  • TCP spoofing
  • *d. Source routing

  • What is the correct order of phases of a hijack session?
  • track the packet, synchronize the connection, inject the packet
  • *b. track the connection, desynchronize the connection, inject the packet

  • synchronize the connection, track the packet, inject the packet
  • desynchronize the connection, track the connection, inject the packet
  • Which type of hijacking is a hacking technique that uses spoofed packets to take over
  • a connection between a victim and a target machine?

  • ACK
  • Blind
  • *c. TCP/IP

  • Network-level
  • In which form of TCP/IP hijacking can the hacker can reset the victim's connection if
  • it uses an accurate acknowledgment number?

  • ACK
  • Blind
  • IP
  • *d. RST

  • Which of the following is a best practice to try to prevent session hijacking?
  • Use remote access extensively
  • Use an unencrypted protocol
  • *c. Limit incoming connections

  • Use clear text for authentication
  • / 2

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The detailed explanations offered by this document was incredibly useful for my research. A excellent purchase!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 30, 2025
Description:

Chapter 1 1. In what type of exploitation does an attacker steal a valid session ID and use it to get into the system to extract data? a. Impersonation b. A man-in-the-middle attack *c. Session hij...

Unlock Now
$ 1.00