Review Questions 305
A. Session splicing
B. Denial-of-service
C. Source routing
D. MITM
- Jason is a junior system administrator for a small firm of 50 employees. For the last week
a few users have been complaining of losing connectivity intermittently with no suspect
behavior on their part such as large downloads or intensive processes. Jason runs Wire-
shark on Monday morning to investigate. He sees a large amount of ARP broadcasts being
sent at a fairly constant rate. What is Jason most likely seeing?
A. ARP poisoning
B. ARP caching
C. ARP spoofing
D. DNS spoofing - Which of the following is not a source of session IDs?
A. URL
B. Cookie
C. Anonymous login
D. Hidden login
- Which kind of values are injected into a connection to the host machine in an effort to
increment the sequence number in a predictable fashion?
A. Counted
B. Bit
C. Null
D. IP - An ethical hacker sends a packet with a deliberate and specific path to its destination. What
technique is the hacker using?
A. IP spoofing
B. Source routing
C. ARP poisoning
D. Host routing - Network-level hijacking focuses on the mechanics of a connection such as the manipulation
of packet sequencing. What is the main focus of web app session hijacking?
A. Breaking user logins
B. Stealing session IDs
C. Traffic redirection
D. Resource DoS