WMS Sample Paper 1 Solution
WMS Sample Paper 1 Solution
WMS Sample Paper 1 Solution
A mesh topology is a network setup where each computer and network device is
interconnected with one another. This topology setup allows for most
transmissions to be distributed even if one of the connections goes down. It is a
topology commonly used for wireless networks. Below is a visual example of a
simple computer setup on a network using a mesh topology.
2. What is DMZ?
Any service provided to users on the public internet should be placed in the DMZ
network. External-facing servers, resources and services are usually located there.
Some of the most common of these services include web, email, domain name
system, File Transfer Protocol and proxy servers.
Servers and resources in the DMZ are accessible from the internet, but the rest of
the internal LAN remains unreachable. This approach provides an additional layer
of security to the LAN as it restricts a hacker's ability to directly access internal
servers and data from the internet.
Social engineering platforms are often used by attackers to launch a CSRF attack.
This tricks the victim into clicking a URL that contains a maliciously crafted,
unauthorized request for a particular Web application. The user’s browser then
sends this maliciously crafted request to a targeted Web application. The request
also includes any credentials related to the particular website (e.g., user session
cookies). If the user is in an active session with a targeted Web application, the
application treats this new request as an authorized request submitted by the user.
Thus, the attacker succeeds in exploiting the Web application’s CSRF
vulnerability.
4. List types of Bluetooth attacks
1. Bluebugging
It is a common and harmless attack that was earlier used to prank people.
Through this, the hacker can only send text messages to the hacked device. It
doesn’t give them access to your smartphone or the data in it.
3. Bluesnarfing
Out of the different types of Bluetooth attacks, this is one of the most dangerous.
When hackers are within 300 feet of a device, they can conduct a bluesnarfing
attack (around 90 meters).
This happens because, even if your device is set to non-discoverable mode, hackers
can still attack and access your personal information.
They can also copy the data on your device, including your photos and videos,
phone number, contact list, emails, and passwords.
Thus, keep your Bluetooth in invisible mode. Since it makes it difficult for hackers
to figure out the model and name of your device.
5. Location Tracking
This attack is one of the different types of Bluetooth attacks that occur on locating
and tracking devices.
Fitness lovers are more vulnerable to this attack since their fitness devices are
always linked to their Bluetooth.
An injection attack can expose or damage data and lead to a denial of service or a
full webserver compromise. Such attacks are possible due to vulnerabilities in the
code of an application that allows for unvalidated user input.
Cross-Site Scripting (XSS): Whenever an application allows user input within the
output it generates, it allows an attacker to send malicious code to a different end-
user without validating or encoding it. XSS takes these opportunities to inject
malicious scripts into trusted websites.
Code Injection: In this scenario, an attacker is acquainted with the application code
and programming language. By exploiting a vulnerability, they may attempt to
inject code into the application to be executed as a command by its web server.
o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
Low-cost cable, Familiar technology, Moderate data speeds and Limited failure.
Ring Topology
Star Topology
Advantages
Mesh Technology
Advantages
Hybrid Technology
Advantages
11.
Explain remote server security attacks? Explain all methods? Explain mitigations.
An attacker could breach a system via remote access by:
Scanning the Internet for vulnerable IP addresses.
Running a password-cracking tool.
Simulatinga remote access session with cracked username and password
information.
Once inside the system, the attacker may upload malware, copy all sensitive data,
and use the compromised system to attack other computers or network within the
same environment. The malware will continue to steal data even after the attacker
logs out and may go undetected for a long period of time.
DoS attacks
DNS Poisoning
Using DNS (Domain Name Server) poisoning, hackers can trick the DNS server of
any computer into believing that fake data is legitimate and authentic.
Port scanning
Port scanning is used to determine which computer ports are open on a network
host. A port scanner is software designed to find such ports.
TCP desynchronization
SMB Relay
SMB Relay and SMBRelay2 are special programs that are capable of carrying out
attacks against remote computers.
ICMP attacks
Threats against data can come from outside attackers motivated by profit, activism,
retribution, or mischief. Insider threats may have the same motives but could be
tied to workplace issues resulting in people abusing their access privileges to inflict
harm.
In either case, it is the responsibility of a data owner to protect data from misuse,
disclosure, theft, unauthorized exposure, wrongful transmission, and so on while
still making the data useful and available to conduct business. To that end, a
mitigation strategy should be strict in accordance with risk appetites and realistic
enough to allow for the licit use of the data by those authorized.
12.
a) How CSS attack is performed? Explain methods and solutions.
To carry out a cross site scripting attack, an attacker injects a malicious script into
user-provided input. Attackers can also carry out an attack by modifying a request.
If the web app is vulnerable to XSS attacks, the user-supplied input executes as
code. For example, in the request below, the script displays a message box with the
text “xss.”
http://www.site.com/page.php?var=<script>alert('xss');</script>
There are many ways to trigger an XSS attack. For example, the execution could
be triggered automatically when the page loads or when a user hovers over specific
elements of the page (e.g., hyperlinks).
Potential consequences of cross site scripting attacks include these:
Solutions