Boot Camp Q's Flashcards

1
Q

*An employee receives an email, which appears to be from the Chief Executive Officer (CEO), asking for a report of security credentials for all users. Which of the following types of attacks is MOST likely occurring?

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

*A user clicked an email link that led to a website that infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not detected or blocked by the company’s email filter, or antivirus. Which of the following describes what occurred?

A

The virus was a zero-day attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An information security specialist is reviewing the following output from a Linux server:
user@server:~$ crontab -l
5
***/usr/local/bin/backup.sh
user@server:~$ cat /usr/local/bin/backup.sh
#!/bin/bash
if ! Grep -quiet bobuser /etc/passwd then rm -rf
fi
Based on the information above, which of the following types of malware was installed on the server?

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

A

Using salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following cryptographic attacks would salting of passwords render ineffective?

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code:
Void foo (char *bar)
{
char random_user_input[12];
strcpy (random_user_input, bar);
}
Which of the following vulnerabilities is present?
A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*A vulnerability scanner that uses its running service’s access level to better assess vulnerabilities across multiple assets within an organization is performing a:

A

Credentialed scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*Which of the following characteristics differentiate a rainbow attack from a brute force attack?

A

Rainbow attacks greatly reduce compute cycles at attack time.
Rainbow tables must include precomputed hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted area of the OS?

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?

A

XSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand and the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

A

The vulnerability scanner is performing in network sniffer mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

*A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of a new administrator accounts. For which of the following is the company hiring the consulting firm?

A

Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following penetration testing concepts is being used when an attacker uses public internet databases to enumerate and learn more about a target?

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

A

Passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?

A

Unpatched exploitable internet-facing services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of attacks precedes the installation of a rootkit on a server?

A

Privilege escalation

17
Q

Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
-Slow performance
-Word documents, PDFs, and images no longer opening
-A pop-up
Ann states the issues began after she opened an invoice that vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word prrocessor. With which of the following is the device MOST likely infected?

A

Crypto-malware

18
Q

A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

A

Botnet

19
Q

*When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

A

end-of-life systems

20
Q

Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed. Which of the following BEST describes the attacker vector used to infect the devices?

A

Typo squatting

21
Q

A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatably locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and odes not have network access. Which of the following types of attacks are MOST likely occurring?

A

Brute force

Dictionary

22
Q

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A

The scan output lists SQL injection attack vectors

23
Q

A security administrator is reviewing the following network capture:
192.168.20.43:2043 _> 10.234.66.21.80
POST “192.168.20.43
https://www.banksite.comJoeUsrerPassword”
Which of the following malware is MOST likely to generate the above information?

A

Keylogger

24
Q

*An auditor is reviewing the following output from a password-cracking tool:
User1:Password1
User2:Recovery!
User3:Alaskan10
User4:4Private
User5:PerForMance2
Which of the following methods did the auditor MOST likely use?

A

Hybrid

25
Q

A company hires a third-party firm to conduct an assessment of vulnerabilties exposed to the internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists from the vendor. Which of the following BEST describes the reason why the vulnerability exists?

A

End-of-life system

26
Q

A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him. Which of the following BEST describes what occurred?

A

The hacker exploited a weak switch configuration.

27
Q

*Which of the following would MOST likely appear in an uncredentialed vulnerability scan?

A

Inactive local accounts

28
Q

As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed?

A

White box

29
Q

*A penetration tester is crawling a target website that is available to the public. Which of the following represents the actions the penetration tester is performing?

A

Reconnaissance