 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 23 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which of the following example do not comes under network level session hijacking. | 
| A. | TCP/IP Hijacking | 
| B. | RST Hijacking | 
| C. | Domain Hijacking | 
| D. | Blind Hijacking | 
| Answer» D. Blind Hijacking | |
| 2. | The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. | 
| A. | network level | 
| B. | physical level | 
| C. | application level | 
| D. | data level | 
| Answer» B. physical level | |
| 3. | Session hijacking takes place at ____________ number of levels. | 
| A. | five | 
| B. | four | 
| C. | three | 
| D. | two | 
| Answer» E. | |
| 4. | In an _________________ attack, an attacker finds an active session & takes over that session. | 
| A. | network session hijacking | 
| B. | passive session hijacking | 
| C. | active session hijacking | 
| D. | social-networking session hijacking | 
| Answer» D. social-networking session hijacking | |
| 5. | With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth. | 
| A. | network session hijacking | 
| B. | passive session hijacking | 
| C. | active session hijacking | 
| D. | social-networking session hijacking | 
| Answer» C. active session hijacking | |
| 6. | In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. | 
| A. | phishing | 
| B. | spoofing | 
| C. | hijacking | 
| D. | vishing | 
| Answer» C. hijacking | |
| 7. | ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections. | 
| A. | Internet | 
| B. | Network | 
| C. | Hijacking | 
| D. | Sessions | 
| Answer» E. | |
| 8. | SESSION_HIJACKING_TAKES_PLACE_AT______________NUMBER_OF_LEVELS.?$ | 
| A. | five | 
| B. | four | 
| C. | three | 
| D. | two | 
| Answer» E. | |
| 9. | IN_AN___________________ATTACK,_AN_ATTACKER_FINDS_AN_ACTIVE_SESSION_&_TAKES_OVER_THAT_SESSION.?$ | 
| A. | network session hijacking | 
| B. | passive session hijacking | 
| C. | active session hijacking | 
| D. | social-networking session hijacking | 
| Answer» D. social-networking session hijacking | |
| 10. | Which of the following example do not comes under network level session hijacking.$ | 
| A. | TCP/IP Hijacking | 
| B. | RST Hijacking | 
| C. | Domain Hijacking | 
| D. | Blind Hijacking | 
| Answer» D. Blind Hijacking | |
| 11. | The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.$ | 
| A. | network level | 
| B. | physical level | 
| C. | application level | 
| D. | data level | 
| Answer» B. physical level | |
| 12. | Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 13. | Which of the following is a session hijacking tool? | 
| A. | T-Sight | 
| B. | Wireshark | 
| C. | Maltego | 
| D. | Nessus | 
| Answer» B. Wireshark | |
| 14. | Which of them is not a session hijacking tool? | 
| A. | Juggernaut | 
| B. | IP watcher | 
| C. | Wireshark | 
| D. | Paros HTTP Hijacker | 
| Answer» D. Paros HTTP Hijacker | |
| 15. | In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session. | 
| A. | network level | 
| B. | physical level | 
| C. | application level | 
| D. | data level | 
| Answer» C. application level | |
| 16. | With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth? | 
| A. | network session hijacking | 
| B. | passive session hijacking | 
| C. | active session hijacking | 
| D. | social-networking session hijacking | 
| Answer» C. active session hijacking | |
| 17. | There are ___________ types of session hijacking. | 
| A. | 2 | 
| B. | 3 | 
| C. | 4 | 
| D. | 5 | 
| Answer» B. 3 | |
| 18. | In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.$ | 
| A. | phishing | 
| B. | spoofing | 
| C. | hijacking | 
| D. | vishing | 
| Answer» C. hijacking | |
| 19. | _______________ is done only after the target user has connected to the server. | 
| A. | Server hacking | 
| B. | Banner grabbing | 
| C. | Cracking | 
| D. | Hijacking | 
| Answer» E. | |
| 20. | Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system. | 
| A. | authentications | 
| B. | breaches | 
| C. | integrations | 
| D. | associations | 
| Answer» B. breaches | |
| 21. | ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.$ | 
| A. | Internet | 
| B. | Network | 
| C. | Hijacking | 
| D. | Sessions | 
| Answer» E. | |
| 22. | The most commonly used session hijacking attack is the _______________ | 
| A. | IP hacking | 
| B. | IP spooling | 
| C. | IP spoofing | 
| D. | IP tracking | 
| Answer» D. IP tracking | |
| 23. | _____________ attack is the exploitation of the web-session & its mechanism that is usually managed with a session token. | 
| A. | Session Hacking | 
| B. | Session Hijacking | 
| C. | Session Cracking | 
| D. | Session Compromising | 
| Answer» C. Session Cracking | |