02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

304 Chapter 12 ■ Session Hijacking<br />

Review Questions<br />

1. Which statement defines session hijacking most accurately?<br />

A. Session hijacking involves stealing a user’s login information and using that information<br />

to pose as the user later.<br />

B. Session hijacking involves assuming the role of a user through the compromise of physical<br />

tokens such as common access cards.<br />

C. Session hijacking is an attack that aims at stealing a legitimate session and posing as<br />

that user while communicating with the web resource or host machine.<br />

D. Session hijacking involves only web applications and is specific to stealing session IDs<br />

from compromised cookies.<br />

2. Julie has been sniffing the Wi-Fi traffic at a local coffee shop in an effort to learn more<br />

about sniffing tools and reading packet captures. She is careful not to inject packets, or<br />

to perform malicious activities; she just received her <strong>CEH</strong> credential, so she wants to stay<br />

white hat. What would Julie’s activities be categorized as?<br />

A. Passive<br />

B. Monitoring<br />

C. Active<br />

D. Sniffing<br />

3. Based on the diagram, what attack is occurring?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!