1. Right Answer: C
Explanation: The attacker first collects the information about a large number of potentially vulnerable machines to create a Hit-list. Using this technique, the attacker finds the vulnerable machine and infects it. Once a machine is infected, the list is divided by assigning half of the list to the newly compromised system. The scanning process in Hit-list scanning runs simultaneously. This technique is used to ensure the spreading and installation of malicious code in a short perio
2. Right Answer: B
Explanation: Infected machine probes IP addresses randomly form IP address space and scan them for vulnerability. When it finds a vulnerable machine, it breaks into it and infects it with the script that is being used to infect itself. Random scanning technique spreads the infection very quickly as it compromises a large number of the host.
3. Right Answer: D
Explanation: In Session Hijacking, the attacker intercepts the session and takes over the legitimate authenticated session. When a session authentication process is complete, and the user is authorized to use resources such as web services, TCP communication or other, the attacker takes advantage of this authenticated session and places himself in between the authenticated user and the host.
4. Right Answer: A
Explanation: SQL Injection Attacks uses SQL websites or web applications. It relies on the strategic injection of malicious code or script in existing queries.
5. Right Answer: A
Explanation: Source routing is a technique of sending the packet via selected routes. In session hijacking, this technique is used to attempt IP spoofing as a legitimate host with the help of source routing to direct the traffic through the path identical to the victim's path.