Posted: September 16th, 2017
Session hijacking
1) Session hijacking can be mitigated by making changes to the server – client credential process. Describe one of the methods.
2) The user is a critical part of phishing prevention. What are two elements that might give away an attempt to pose as a financial site?
3) A browser can warn a user of a homeograph attack with a visual cue. Give an example describing a method that still allows the user to browse to a Chinese or Arabic site.
4) Based on the reading in the book an attacker (most of the time) must learn about the database in order to attack with SQL injection. How can information be gathered without insider knowledge?
5) Why isn’t input validation always done if it can mitigate the #1 cyber attack vector? Whose “job” is it?
1) Why is DNS considered one of the “pillar”
application layer protocols?
2) Briefly describe the process for a DNS query.
3) Why does UDP perform as the transport protocol for most DNS requests?
4) In the reading and the web link describing DNS DDoS, why should open resolvers even be allowed to operate on the internet?
5) Why do you suppose DNSSEC can not just be required? When did this (DNSSEC) get updated to
include root level?
1) A statefull firewall can tell if the HTTP connection is starting from inside the network by looking at the transport layer TCP SYN (synchronize) as well as IP address source. What should it do if someone from the outside is pretending to be an “interior” IP address?
2) What are some items or transactions a company may want to block from the inside going out?
3) Why do companies like VPN capabilities?
4) If Intrusion Detection Systems worked better, we would not have the
cyber security problems we have. What makes this (
creating great IDS) hard to do?
5) Why isn’t IPSec used everywhere?