Boot Camp Q's Flashcards
*An employee receives an email, which appears to be from the Chief Executive Officer (CEO), asking for a report of security credentials for all users. Which of the following types of attacks is MOST likely occurring?
Spear phishing
*A user clicked an email link that led to a website that infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not detected or blocked by the company’s email filter, or antivirus. Which of the following describes what occurred?
The virus was a zero-day attack.
An information security specialist is reviewing the following output from a Linux server:
user@server:~$ crontab -l
5***/usr/local/bin/backup.sh
user@server:~$ cat /usr/local/bin/backup.sh
#!/bin/bash
if ! Grep -quiet bobuser /etc/passwd then rm -rf
fi
Based on the information above, which of the following types of malware was installed on the server?
logic bomb
In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?
Using salt
Which of the following cryptographic attacks would salting of passwords render ineffective?
Rainbow tables
An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code: Void foo (char *bar) { char random_user_input[12]; strcpy (random_user_input, bar); } Which of the following vulnerabilities is present?
Buffer overflow
*A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:
Credentialed scan
*Which of the following characteristics differentiate a rainbow attack from a brute force attack?
Rainbow attacks greatly reduce compute cycles at attack time.
Rainbow tables must include precomputed hashes.
*Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted area of the OS?
Privilege escalation
*Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?
XSS
A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand and the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?
The vulnerability scanner is performing in network sniffer mode.
*A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of a new administrator accounts. For which of the following is the company hiring the consulting firm?
Vulnerability scanning
Which of the following penetration testing concepts is being used when an attacker uses public internet databases to enumerate and learn more about a target?
Reconnaissance
An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:
Passive reconnaissance
Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?
Unpatched exploitable internet-facing services