Chapter 3 Flashcards
- An attacker wants to attack a new social media platform gaining popularity. He wants to exploit the trust the social media has for the users. What kind of attack is he trying to perpetrate?
A. Application programming interface (API) attacks
B. Resource exhaustion
C. Secure Sockets Layer stripping
D. Cross-site Request Forgery
D. The correct answer is Cross-site Request Forgery. Cross-site
request forgery, also known as one-click attack or session riding
and abbreviated as CSRF or XSRF, is a type of malicious exploit of
a website where unauthorized commands are submitted from a
user that the web application trusts.
- A web application that generates memory leaks when
subjected to some certain conditions is vulnerable to what type of
attack?
A. Dnsenum
B. Denial-Of-Service
C. DNS poisoning
D. Disassociation
B. The correct answer is Denial-Of-Service. A Denial-of-Service
(DoS) attack is an attack meant to shut down a machine or
network, making it inaccessible to its intended users. DoS attacks
accomplish this by flooding the target with traffic, or sending it
information that triggers a crash. If an attacker can make the web
application generate a memory leak, the application will eventually
consume all memory on the web server and the web server will
crash.
- The security man in Peak company is called Adams. Workers of Peak enter the company by inserting smartcards into the door;
what way would an attacker likely use to pass through the door?
A. Shoulder surfing
B. Dumpster diving
C. Pharming
D. Tailgating
D. The correct answer is Tailgating. A tailgating attack, also referred
to as “piggybacking,” involves attackers seeking entry to a
restricted area without proper authentication. In it, the perpetrators
can simply follow an authorized person into a restricted location.
They can impersonate delivery men carrying tons of packages,
waiting for an employee to open the door. They can ask the
unknowing target to hold the door, bypassing security measures
like electronic access control.
- A user who is not observant of his physical surrounding can be
vulnerable to?
A. Shoulder surfing
B. Dumpster diving
C. Pharming
D. Tailgating
A. The correct answer is Shoulder surfing. Shoulder surfing is the
practice of spying on the user of a cash-dispensing machine or
other electronic devices in order to obtain their personal
identification number, password, etc.
- A penetration test in which so much detail is given to you about the target network is known as?
A. Target environment
B. Known environment
C. Detailed environment
D. Network environment
B. The correct answer is Known environment. Known environment
or White Box Testing is software testing technique in which internal
structure, design and coding of software are tested to verify flow of
input-output and to improve design, usability and security. In white
box testing, code is visible to testers so it is also called Clear box
testing. In a known environment, the tester is given extensive
knowledge of the target network.
- A caller tries to trick you by claiming to be in charge of technical security in GT bank, where you work. He claims there is a virus that is spreading on GT bank systems and he needs you to grant him access to your computer so he can prevent it from being affected by the virus. What social engineering principle is this caller using?
A. Urgency and authority
B. Urgency and trust
C. Urgency and scarcity
D. Urgency and familiarity
A. The correct answer is Urgency and authority. The attacker presented the case as needing quick intervention (urgency) and
presented himself as a technical security personnel (authority)
- Which type of attack is used to intercept and manipulate calls between the main application’s executable (ex: the browser) and its security mechanisms or libraries on-the-fly?
A. Man in the browser
B. Session replays
C. SQL Injection
D. Cross-site Scripting
A. The correct answer is Man in the browser. The Man-in-theBrowser attack is the same approach as Man-in-the-middle attack,
but in this case is used to intercept and manipulate calls between
the main application’s executable (ex: the browser) and its security
mechanisms or libraries on-the-fly. The most common objective of
this attack is to cause financial fraud by manipulating transactions
of Internet Banking systems, even when other authentication
factors are in use.
- A malware infection in your company results in a data breach.
Your coworker reports that she had seen two keyboards plugged
into a system by the receptionist’s desk. What would you focus on
finding in this investigation?
A. Card cloning
B. Malicious USB cable
C. Skimming
D. Malicious flash drive
B. The correct answer is Malicious USB cable. A malicious USB
cable is a type of cable that can receive commands from a nearby
smartphone and then execute them over the PC it’s been plugged
into.
- The technical administrator in PHB bank has detected an
attack in which the attacker’s system is being presented as the server to the bank staff, and the attacker is being presented to the server as the bank staff. What kind of attack is this?
A. On-path attack
B. DDoS attack
C. Evil twin
D. DNS poisoning
A. The correct answer is On-path attack. On-path attackers place
themselves between two devices (often a web browser and a web
server) and intercept or modify communications between the two.
The attackers can then collect information as well as impersonate
either of the two agents
- A caller has been constantly calling your company line. When the receptionist picks the call, the caller asks some questions and says he is conducting a survey for a non-governmental organization. From the questions he asks, you suspect he is trying to steal information about your company. How would you describe this experience?
A. Smishing
B. Vishing
C. Whaling
D. Prepending
B. The correct answer is Vishing. Vishing is the fraudulent practice
of making phone calls or leaving voice messages purporting to be
from reputable companies in order to induce individuals to reveal
personal information, such as bank details and credit card
numbers.
- After a vulnerability scan, if a company’s wireless router is confirmed to be vulnerable in its web server, what problem should the company address?
A. Weak encryption protocol
B. Default credentials
C. Default WPA settings
D. Firmware patch management
D. The correct answer is Firmware patch management. Patching
provides a mechanism to regularly update features and protect
software with current enhancements and bug fixes, and software
updates for consumer-grade wireless routers are normally executed
as firmware updates.
- Why is it considered a major security problem when memory
leak occurs?
A. Memory leak freezes systems for 5 minutes
B. Memory leak causes crashes
C. Memory leak sends data to remote servers
D. Memory leak exposes data
B. The correct answer is Memory leak causes crashes. Memory
leaks result in crashes and this in turn culminates in an outage.
- Which of the following attacks is a card reader that can be
disguised to look like part of an ATM?
A. Backdoor
B. Rootkit
C. Card cloning
D. Skimming
D. The correct answer is Skimming. Skimming is an illegal practice
used by identity thieves to capture credit card information from a
cardholder surreptitiously. Fraudsters often use a device called a skimmer that can be installed at gas pumps or ATM machines to
collect card data. Some machines act like point-of-sale technology.
- One major difference between active reconnaissance and passive reconnaissance is?
A. Passive reconnaissance is an attempt to gain information
about computers without actively engaging with the systems while
active reconnaissance is an attempt to gain information about
computers typically by conducting a port scan to find any open
ports
B. Active reconnaissance is an attempt to gain information about
computers without actively engaging with the systems while passive reconnaissance is an attempt to gain information about computers typically by conducting a port scan to find any open ports
C. Passive reconnaissance is an attempt to gain information
about computers without any tools while active reconnaissance is an attempt to gain information about computers typically by conducting a port scan to find any open ports
D. Passive reconnaissance is an attempt to gain information
about computers without actively engaging with the systems while active reconnaissance is an attempt to gain information about computers typically without any tools
A. The correct answer is Passive reconnaissance is an attempt to
gain information about computers without actively engaging with
the systems while active reconnaissance is an attempt to gain
information about computers typically by conducting a port scan to
find any open ports.
- A technique which is rarely used in preventing LDAP injection
attacks is?
A. Minimize the privileges assigned to the LDAP account
B. Input validation and encoding
C. LDAP query parameterization
D. Escape all variables
C. The correct answer is LDAP query parameterization. The LDAP
parameters dialog specifies an LDAP search operation to locate
directory entries and optionally return attributes from those entries.
All the other options are used.