Session Hijacking, Web Servers and Applications & SQL Injection
![]() |
Session Hijacking, Web Servers and Applications & SQL Injection |
Session Hijacking :-
1. Which statement defines session hijacking most accurately?
A. Session hijacking involves stealing a user’s login information and using that
information to pose as the user later.
B. Session hijacking involves assuming the role of a user through the compromise of
physical tokens such as common access cards.
C. Session hijacking is an attack that aims at stealing a legitimate session and posing
as that user while communicating with the web resource or host machine. ✔️
D. Session hijacking involves only web applications and is specific to stealing session
IDs from compromised cookies.
2. Jennifer has been working with sniffing and session-hijacking tools on her company
network. Since she wants to stay white hat—that is, ethical—she has gotten permission
to undertake these activities. What would Jennifer’s activities be categorized as?
A. Passive ✔️
B. Monitoring
C. Active
D. Sniffing
4. Jennifer is a junior system administrator for a small firm of 50 employees. For the last
week a few users have been complaining of losing connectivity intermittently with no
suspect behavior on their part such as large downloads or intensive processes.
Jennifer runs Wireshark on Monday morning to investigate. She sees a large amount
of ARP broadcasts being sent at a fairly constant rate. What is Jennifer most likely
seeing?
A. ARP poisoning ✔️
B. ARP caching
C. ARP spoofing
D. DNS spoofing
5. Which of the following is not a source of session IDs?
A. URL
B. Cookie
C. Anonymous login ✔️
D. Hidden login
6. Which kind of values is injected into a connection to the host machine in an effort to
increment the sequence number in a predictable fashion?
A. Counted
B. Bit
C. Null ✔️
D. IP
7. An ethical hacker sends a packet with a deliberate and specific path to its destination.
What technique is the hacker using?
A. IP spoofing
B. Source routing ✔️
C. ARP poisoning
D. Host routing
8. Network-level hijacking focuses on the mechanics of a connection such as the
manipulation of packet sequencing. What is the main focus of web app session
hijacking?
A. Breaking user logins
B. Stealing session IDs ✔️
C. Traffic redirection
D. Resource DoS
9. A public use workstation contains the browsing history of multiple users who logged
in during the last seven days. While digging through the history, a user runs across the
following web address: www.snaz22enu.com/&w25/session=22525. What kind of
embedding are you seeing?
A. URL embedding ✔️
B. Session embedding
C. Hidden form embedding
D. Tracking cookie
10. Julie has sniffed an ample amount of traffic between the targeted victim and an
authenticated resource. She has been able to correctly guess the packet sequence
numbers and inject packets, but she is unable to receive any of the responses. What
does this scenario define?
A. Switched network
B. SSL encryption
C. TCP hijacking
D. Blind hijacking ✔️
11. Session hijacking can be performed on all of the following protocols except which
one?
A. FTP
B. SMTP
C. HTTP
D. IPsec ✔️
12. Which technology can provide protection against session hijacking?
A. IPsec ✔️
B. UDP
C. TCP
D. IDS
13. Session fixation is a vulnerability in which of the following?
A. Web applications ✔️
B. Networks
C. Software applications
D. Protocols
14. Session hijacking can be thwarted with which of the following?
A. SSH
B. FTP
C. Authentication ✔️
D. Sniffing
15. XSS is typically targeted toward which of the following?
A. Web applications
B. Email clients
C. Web browsers ✔️
D. Users
16. A man-in-the-browser attack is typically enabled by using which mechanism?
A. Virus
B. Worms
C. Logic bombs
D. Trojans ✔️
17. A man-in-the-middle attack is an attack where the attacking party does which of the
following?
A. Infect the client system
B. Infect the server system
C. Insert themselves into an active session ✔️
D. Insert themselves into a web application
18. A session hijack can happen with which of the following?
A. Networks and applications ✔️
B. Networks and physical devices
C. Browsers and applications
D. Cookies and devices
19. A session hijack can be initiated from all of the following except which one?
A. Emails
B. Browsers
C. Web applications
D. Cookies and devices ✔️
20. Session hijacking can do all of the following except which one?
A. Take over an authenticated session
B. Be used to steal cookies
C. Take over a session
D. Place a cookie on a server ✔️
Web Servers and Applications :-
1. Which of the following best describes a web application?
A. Code designed to be run on the client
B. Code designed to be run on the server ✔️
C. SQL code for databases
D. Targeting of web services
2. __________ is a client-side scripting language.
A. JavaScript ✔️
B. ASP
C. ASP.NET
D. PHP
3. Which of the following is an example of a server-side scripting language?
A. JavaScript
B. PHP ✔️
C. SQL
D. HTML
4. Which of the following is used to access content outside the root of a website?
A. Brute force
B. Port scanning
C. SQL injection
D. Directory traversal ✔️
5. Which of the following can prevent bad input from being presented to an application
through a form?
A. Request filtering
B. Input validation ✔️
C. Input scanning
D. Directory traversing
6. __________ can be used to identify a web server.
A. Session hijacking ✔️
B. Banner grab ✔️
C. Traversal
D. Header analysis
7. In the field of IT security, the concept of defense in depth is layering more than one
control on another. Why would this be helpful in the defense of a system of sessionhijacking?
A. To provide better protection ✔️
B. To build dependency among layers
C. To increase logging ability
D. To satisfy auditors
8. Which of the following is used to set permissions on content in a website?
A. HIDS
B. ACE
C. ACL ✔️
D. ALS
9. What could be used to monitor application errors and violations on a web server or
application?
A. HIDS
B. HIPS
C. NIDS
D. Logs ✔️
10. Which of the following is an attribute used to secure a cookie?
A. Encrypt
B. Secure ✔️
C. HttpOnly ✔️
D. Domain ✔️
11. A POODLE attack targets what exactly?
A. SSL ✔️
B. TLS
C. VPN
D. AES
12. What is used to store session information?
A. Cookie ✔️
B. Snoop
C. Directory
D. File
13. Which attack can be used to take over a previous session?
A. Cookie snooping
B. Session hijacking ✔️
C. Cookie hijacking
D. Session sniffing
14. Which command would retrieve banner information from a website at port 80?
A. nc 192.168.10.27 80 ✔️
B. nc 192.168.19.27 443
C. nc 192.168.10.27 –p 80
D. nc 192.168.10.27 –p –l 80
15. How is a brute-force attack performed?
A. By trying all possible combinations of characters ✔️
B. By trying dictionary words
C. By capturing hashes
D. By comparing hashes
16. What is the command to retrieve header information from a web server using Telnet?
A. telnet <website name> 80 ✔️
B. telnet <website name> 443
C. telnet <website name> –port:80
D. telnet <website name> –port:443
17. Groups and individuals who may hack a web server or web application based on
principle or personal beliefs are known as __________.
A. White hats
B. Black hats
C. Script kiddies
D. Hacktivists ✔️
18. The Wayback Machine would be useful in viewing what type of information relating to
a web application?
A. Get Job postings
B. Websites
C. Archived versions of websites ✔️
D. Backup copies of websites
19. What may be helpful in protecting the content on a web server from being viewed by
unauthorized personnel?
A. Encryption ✔️
B. Permissions
C. Redirection
D. Firewalls
20. A common attack against web servers and web applications is __________.
A. Banner grab
B. Input validation
C. Buffer validations
D. Buffer overflow ✔️
SQL Injection :-
1. Input validation is used to prevent which of the following?
A. Bad input ✔️
B. Formatting issues
C. Language issues
D. SQL injection ✔️
2. Web applications are used to __________.
A. Provide dynamic content ✔️
B. Stream video
C. Apply scripting
D. Implement security controls
3. Which of the following challenges can be solved by firewalls?
A. Protection against buffer overflows
B. Protection against scanning ✔️
C. Enforcement of privileges
D. Ability to use nonstandard ports
4. Databases can be a victim of code exploits depending on which of the following?
A. Configuration ✔️
B. Vendor
C. Patches
D. Client version
5. In addition to relational databases, there is also what kind of database?
A. Hierarchical ✔️
B. SQL
C. ODBC
D. Structured
6. Which of the following is a scripting language?
A. ActiveX
B. Java
C. CGI ✔️
D. ASP.NET
7. __________ is used to audit databases.
A. Ping
B. Ipconfig
C. SQLPing ✔️
D. Traceroute
8. Browsers do not display __________.
A. ActiveX
B. Hidden fields ✔️
C. Java
D. JavaScript
9. Proper input validation can prevent what from occurring?
A. Client-side issues
B. Operating system exploits ✔️
C. SQL injection attacks
D. Software failure
10. __________ can be used to attack databases.
A. Buffer overflows
B. SQL injection ✔️
C. Buffer injection
D. Input validation
11. Which command can be used to access the command prompt in SQL Server?
A. WHERE
B. SELECT
C. xp_cmdshell ✔️
D. cmdshell
12. Which command is used to query data in SQL Server?
A. cmdshell
B. WHERE ✔️
C. SELECT ✔️
D. from ✔️
13. Which statement is used to limit data in SQL Server?
A. cmdshell
B. WHERE ✔️
C. SELECT
D. to
14. Which command is used to remove a table from a database?
A. cmdshell –drop table
B. REMOVE
C. DROPTABLES
D. drop table ✔️
15. SQL injection attacks are aimed at which of the following?
A. Web applications
B. Web servers
C. Databases ✔️
D. Database engines
16. Which of the following is another name for a record in a database?
A. Row ✔️
B. Column
C. Cell
D. Label
17. What type of database has its information spread across many disparate systems?
A. Hierarchical ✔️
B. Relational
C. Distributed ✔️
D. Flat
18. What type of database uses multiple tables linked together in complex relationships?
A. Hierarchical
B. Relational ✔️
C. Distributed
D. Flat
19. What can an error message tell an attacker?
A. Success of an attack
B. Failure of an attack
C. Structure of a database
D. All of the above ✔️
20. A blind SQL injection attack is used when which of the following is true?
A. Error messages are not available. ✔️
B. The database is not SQL compatible.
C. The database is relational.
D. All of the above.