

MCQOPTIONS
Saved Bookmarks
This section includes 23 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which of the following example do not comes under network level session hijacking. |
A. | TCP/IP Hijacking |
B. | RST Hijacking |
C. | Domain Hijacking |
D. | Blind Hijacking |
Answer» D. Blind Hijacking | |
2. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications. |
A. | network level |
B. | physical level |
C. | application level |
D. | data level |
Answer» B. physical level | |
3. |
Session hijacking takes place at ____________ number of levels. |
A. | five |
B. | four |
C. | three |
D. | two |
Answer» E. | |
4. |
In an _________________ attack, an attacker finds an active session & takes over that session. |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» D. social-networking session hijacking | |
5. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth. |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» C. active session hijacking | |
6. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack. |
A. | phishing |
B. | spoofing |
C. | hijacking |
D. | vishing |
Answer» C. hijacking | |
7. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections. |
A. | Internet |
B. | Network |
C. | Hijacking |
D. | Sessions |
Answer» E. | |
8. |
SESSION_HIJACKING_TAKES_PLACE_AT______________NUMBER_OF_LEVELS.?$ |
A. | five |
B. | four |
C. | three |
D. | two |
Answer» E. | |
9. |
IN_AN___________________ATTACK,_AN_ATTACKER_FINDS_AN_ACTIVE_SESSION_&_TAKES_OVER_THAT_SESSION.?$ |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» D. social-networking session hijacking | |
10. |
Which of the following example do not comes under network level session hijacking.$ |
A. | TCP/IP Hijacking |
B. | RST Hijacking |
C. | Domain Hijacking |
D. | Blind Hijacking |
Answer» D. Blind Hijacking | |
11. |
The ______________ hijacking is implemented on the data flow of protocol shared by all web applications.$ |
A. | network level |
B. | physical level |
C. | application level |
D. | data level |
Answer» B. physical level | |
12. |
Hjksuite Tool is a collection of programs for hijacking. It contains a library called hjklib which can help in implementing TCP/IP stack-over hijacking. |
A. | True |
B. | False |
Answer» B. False | |
13. |
Which of the following is a session hijacking tool? |
A. | T-Sight |
B. | Wireshark |
C. | Maltego |
D. | Nessus |
Answer» B. Wireshark | |
14. |
Which of them is not a session hijacking tool? |
A. | Juggernaut |
B. | IP watcher |
C. | Wireshark |
D. | Paros HTTP Hijacker |
Answer» D. Paros HTTP Hijacker | |
15. |
In ___________________ session hijacking, hackers gain session ID for taking control of existing session or even create a new unauthorized session. |
A. | network level |
B. | physical level |
C. | application level |
D. | data level |
Answer» C. application level | |
16. |
With ___________________ attack, an attacker hijacks a session but do not alter anything. They just sit back and watch or record all the traffic and data being sent forth? |
A. | network session hijacking |
B. | passive session hijacking |
C. | active session hijacking |
D. | social-networking session hijacking |
Answer» C. active session hijacking | |
17. |
There are ___________ types of session hijacking. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
18. |
In _______________ attack, the attacker doesn’t actively take over another user to perform the attack.$ |
A. | phishing |
B. | spoofing |
C. | hijacking |
D. | vishing |
Answer» C. hijacking | |
19. |
_______________ is done only after the target user has connected to the server. |
A. | Server hacking |
B. | Banner grabbing |
C. | Cracking |
D. | Hijacking |
Answer» E. | |
20. |
Since most _______________________ occur at the very beginning of the TCP session, this allows hackers to gain access to any system. |
A. | authentications |
B. | breaches |
C. | integrations |
D. | associations |
Answer» B. breaches | |
21. |
________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a means to distinguish every user’s connections.$ |
A. | Internet |
B. | Network |
C. | Hijacking |
D. | Sessions |
Answer» E. | |
22. |
The most commonly used session hijacking attack is the _______________ |
A. | IP hacking |
B. | IP spooling |
C. | IP spoofing |
D. | IP tracking |
Answer» D. IP tracking | |
23. |
_____________ attack is the exploitation of the web-session & its mechanism that is usually managed with a session token. |
A. | Session Hacking |
B. | Session Hijacking |
C. | Session Cracking |
D. | Session Compromising |
Answer» C. Session Cracking | |