DCHP starvation attacks are launched by an attacker with the intent to create
a DoS for DHCP clients. To accomplish this goal, the attacker uses a tool that sends
many DHCPDISCOVER messages to lease the entire pool of available IP addresses, thus denying them to legitimate hosts.
3. In which type of attack is falsified information used to redirect users to malicious Internet sites?
Two threats to DNS are DNS shadowing and DNS tunneling attacks. DNS
shadowing attacks compromise a parent domain and then the cybercriminal creates subdomains to be used in attacks. DNS tunneling attacks build botnets to bypass traditional security solutions.Three threats to DNS open resolvers are cache poisoning, amplification and reflection, and resource utilization attacks.
5. Which language is used to query a relational database?
A cybercriminal could set up a rogue DHCP server that provides one or more of the
o Wrong default gateway that is used to create a man-in-the-middle attack and allow the attacker to intercept data
o Wrong DNS server that results in the user being sent to a malicious website
o Invalid default gateway IP address that results in a denial of service attack on the DHCP client
9. What is an objective of a DHCP spoofing attack?
A. To gain illegal access to a DHCP server and modify its configuration
B. To intercept DHCP messages and alter the information before sending to DHCP clients
C. To attack a DHCP server and make it unable to provide valid IP addresses to DHCP clients
D. To provide false DNS server addresses to DHCP clients so that visits to a legitimate web server are directed to a fake server
In DHCP spoofing attacks, an attacker configures a fake DHCP server on the
network to provide false DNS server addresses to clients. When a client tries to access a server using a server domain name (for example, a web server), the name to IP resolution request is sent to a DNS server that is under the control of the attacker, which provides the IP address of a fake
10. How do cybercriminals make use of a malicious iFrame?
A. The attacker embeds malicious content in business appropriate files.
B. The iFrame allows multiple DNS subdomains to be used.
C. The iFrame allows the browser to load a web page from another source.
D. The attacker redirects traffic to an incorrect DNS server.
Threat actors use DNS open resolvers to increase the volume of attacks and to hide
the true source of an attack by sending DNS messages to the open resolvers and using the IP
address of a target host (victim).
12. Which two attacks target web servers through exploiting possible vulnerabilities of input functions
used by an application? (Choose two.)
When a web application uses input fields to collect data from clients, threat actors
may exploit possible vulnerabilities for entering malicious commands. The malicious commands
that are executed through the web application might affect the OS on the web server. SQL
injection and cross-site scripting are two different types of command injection attacks.