MCQOPTIONS
Saved Bookmarks
This section includes 23 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following example do not comes under network level session hijacking. |
| A. | TCP/IP Hijacking |
| B. | RST Hijacking |
| C. | Domain Hijacking |
| D. | Blind Hijacking |
| Answer» D. Blind Hijacking | |
| 2. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. |
| A. | network level |
| B. | physical level |
| C. | application level |
| D. | data level |
| Answer» B. physical level | |
| 3. |
Session hijacking takes place at ____________ number of levels. |
| A. | five |
| B. | four |
| C. | three |
| D. | two |
| Answer» E. | |
| 4. |
In an _________________ attack, an attacker finds an active session & takes over that session. |
| A. | network session hijacking |
| B. | passive session hijacking |
| C. | active session hijacking |
| D. | social-networking session hijacking |
| Answer» D. social-networking session hijacking | |
| 5. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth. |
| A. | network session hijacking |
| B. | passive session hijacking |
| C. | active session hijacking |
| D. | social-networking session hijacking |
| Answer» C. active session hijacking | |
| 6. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. |
| A. | phishing |
| B. | spoofing |
| C. | hijacking |
| D. | vishing |
| Answer» C. hijacking | |
| 7. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections. |
| A. | Internet |
| B. | Network |
| C. | Hijacking |
| D. | Sessions |
| Answer» E. | |
| 8. |
SESSION_HIJACKING_TAKES_PLACE_AT______________NUMBER_OF_LEVELS.?$ |
| A. | five |
| B. | four |
| C. | three |
| D. | two |
| Answer» E. | |
| 9. |
IN_AN___________________ATTACK,_AN_ATTACKER_FINDS_AN_ACTIVE_SESSION_&_TAKES_OVER_THAT_SESSION.?$ |
| A. | network session hijacking |
| B. | passive session hijacking |
| C. | active session hijacking |
| D. | social-networking session hijacking |
| Answer» D. social-networking session hijacking | |
| 10. |
Which of the following example do not comes under network level session hijacking.$ |
| A. | TCP/IP Hijacking |
| B. | RST Hijacking |
| C. | Domain Hijacking |
| D. | Blind Hijacking |
| Answer» D. Blind Hijacking | |
| 11. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.$ |
| A. | network level |
| B. | physical level |
| C. | application level |
| D. | data level |
| Answer» B. physical level | |
| 12. |
Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 13. |
Which of the following is a session hijacking tool? |
| A. | T-Sight |
| B. | Wireshark |
| C. | Maltego |
| D. | Nessus |
| Answer» B. Wireshark | |
| 14. |
Which of them is not a session hijacking tool? |
| A. | Juggernaut |
| B. | IP watcher |
| C. | Wireshark |
| D. | Paros HTTP Hijacker |
| Answer» D. Paros HTTP Hijacker | |
| 15. |
In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session. |
| A. | network level |
| B. | physical level |
| C. | application level |
| D. | data level |
| Answer» C. application level | |
| 16. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth? |
| A. | network session hijacking |
| B. | passive session hijacking |
| C. | active session hijacking |
| D. | social-networking session hijacking |
| Answer» C. active session hijacking | |
| 17. |
There are ___________ types of session hijacking. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 18. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.$ |
| A. | phishing |
| B. | spoofing |
| C. | hijacking |
| D. | vishing |
| Answer» C. hijacking | |
| 19. |
_______________ is done only after the target user has connected to the server. |
| A. | Server hacking |
| B. | Banner grabbing |
| C. | Cracking |
| D. | Hijacking |
| Answer» E. | |
| 20. |
Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system. |
| A. | authentications |
| B. | breaches |
| C. | integrations |
| D. | associations |
| Answer» B. breaches | |
| 21. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.$ |
| A. | Internet |
| B. | Network |
| C. | Hijacking |
| D. | Sessions |
| Answer» E. | |
| 22. |
The most commonly used session hijacking attack is the _______________ |
| A. | IP hacking |
| B. | IP spooling |
| C. | IP spoofing |
| D. | IP tracking |
| Answer» D. IP tracking | |
| 23. |
_____________ attack is the exploitation of the web-session & its mechanism that is usually managed with a session token. |
| A. | Session Hacking |
| B. | Session Hijacking |
| C. | Session Cracking |
| D. | Session Compromising |
| Answer» C. Session Cracking | |