501-550 Flashcards
The Chief Information Officer (CIO) receives an anonymous threatening message that says “beware of the 1st of the year”. The CIO suspects the message may be from a former disgruntled employee planning an attack.
Which of the following should the CIO be concerned with?
C.
Logic bomb
Ann, a software developer, has installed some code to reactivate her account one week after her account has been disabled.
Which of the following is this an example of? (Choose two.)
B.
Logic Bomb
D.
Backdoor
Which of the following malware types is MOST likely to execute its payload after Jane, an employee, has left the company?
B.
Logic bomb
Pete, a security analyst, has been tasked with explaining the different types of malware to his colleagues. The two malware types that the group seems to be most interested in are botnets and viruses.
Which of the following explains the difference between these two types of malware?
B.
Botnets are a subset of malware which are used as part of DDoS attacks.
A user, Ann, is reporting to the company IT support group that her workstation screen is blank other than a window with a message requesting payment or else her hard drive will be formatted.
Which of the following types of malware is on Ann’s workstation?
D.
Ransomware
Which of the following describes a type of malware which is difficult to reverse engineer in a virtual lab?
A.
Armored virus
SEE QUESTION 507
Spear fishing Hoax Vishing Phishing Pharming
SEE QUESTION 508
A. Phishing. B. Whaling. C. Vishing. D. Spim. E. Social engineering.
A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs show repeated connection attempts from the following IPs:
- 10.3.16
- 10.3.23
- 178.24.26
- 24.94.83
These attempts are overloading the server to the point that it cannot respond to traffic.
Which of the following attacks is occurring?
B.
DDoS
A distributed denial of service attack can BEST be described as:
C.
Multiple computers attacking a single target in an organized attempt to deplete its resources.
An administrator notices an unusual spike in network traffic from many sources. The administrator suspects that:
B.
it is the beginning of a DDoS attack.
A security technician at a small business is worried about the Layer 2 switches in the network suffering from a DoS style attack caused by staff incorrectly cabling network connections between switches.
Which of the following will BEST mitigate the risk if implemented on the switches?
A.
Spanning tree
An administrator is assigned to monitor servers in a data center. A web server connected to the Internet suddenly experiences a large spike in CPU activity.
Which of the following is the MOST likely cause?
D.
DoS
Which of the following attacks could be used to initiate a subsequent man-in-the-middle attack?
C.
Replay
A network analyst received a number of reports that impersonation was taking place on the network.
Session tokens were deployed to mitigate this issue and defend against the following attacks:
A.
Replay
Timestamps and sequence numbers act as countermeasures against which of the following types of attacks?
D.
Replay
SEE QUESTION 517
Which of the following BEST describes the type of attack that is occurring?
A.
Smurf Attack
Which of the following will help prevent smurf attacks?
B.
Disabling directed broadcast on border routers
Which of the following wireless security measures can an attacker defeat by spoofing certain properties of their network interface card?
B.
MAC filtering
SEE QUESTION 520
Which of the following BEST describes the type of attack that is occurring? (Choose two.)
A.
DNS spoofing
E.
ARP attack