9.4 Final Assessment Flashcards

1
Q

Service Desk is receiving complaints about users not being able to connect to the wireless network. After some analysis, you find indications of a wireless attack designed to block Wi-Fi signals. Which best describes this attack?

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your organization requires that you explain to the software development team that they must take precautions not to allow inputs of this kind of text: ‘ or 1=1–. What attack is related to this text?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your websites need protection against cross-site scripting and SQL injection. Which best describes a practice for defending against those two specific attacks?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You instruct developers about a type of attack that exploits site vulnerabilities using the Document Object Model (DOM). What best describes this type of attack?

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software development teams use defined logic to avoid the condition of a pointer returning NULL because this may allow threat actors to run arbitrary code. What best describes the application behavior in this situation?

A

A dereference exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam over Internet messaging services is known as?

A

SPIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unusual outbound network traffic, geolocation oddities, and high database reads are examples of what threat intelligence key element?

A

Indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Providers like SpamHaus and VirusTotal are examples of what type of threat intelligence source?

A

Open Source Intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What bad programming practice can cause a web application vulnerability concerning invalid data?

A

Improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have received reports from some users on your network that their financial credentials have been stolen. All of them use the same financial organization for their personal banking. The users report that they visited a fake bank website, and their logins were compromised. All the website’s bank visits were made from your organization’s network, and all of them said they typed in the correct URL. What is the most likely explanation for this situation?

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mapping wireless networks while driving is known as:

A

War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have received reports that certain OS versions might produce memory leaks. Why is that potential condition a security issue?

A

It may signal malicious processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During a scan review of the infrastructure, you found a server reporting the Internet Information Server is vulnerable to an exploit reported by the manufacturer months ago. This is despite your belief that the server was fully patched. After checking to see if IIS is missing patches, you find that it is indeed fully patched. What could be the cause of this discrepancy?

A

A false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been assigned as the network security administrator for a company. After some analysis, you discover the company’s networks have sustained a series of advanced attacks over a period of time. Which of the following options describes this attack best?

A

APT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Entering JavaScript into an input text box to enter text that will be viewed by other users is an example of what type of attack?

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly