Chapter 3 Flashcards

1
Q
  1. An attacker wants to attack a new social media platform gaining popularity. He wants to exploit the trust the social media has for the users. What kind of attack is he trying to perpetrate?
    A. Application programming interface (API) attacks
    B. Resource exhaustion
    C. Secure Sockets Layer stripping
    D. Cross-site Request Forgery
A

D. The correct answer is Cross-site Request Forgery. Cross-site
request forgery, also known as one-click attack or session riding
and abbreviated as CSRF or XSRF, is a type of malicious exploit of
a website where unauthorized commands are submitted from a
user that the web application trusts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A web application that generates memory leaks when
    subjected to some certain conditions is vulnerable to what type of
    attack?
    A. Dnsenum
    B. Denial-Of-Service
    C. DNS poisoning
    D. Disassociation
A

B. The correct answer is Denial-Of-Service. A Denial-of-Service
(DoS) attack is an attack meant to shut down a machine or
network, making it inaccessible to its intended users. DoS attacks
accomplish this by flooding the target with traffic, or sending it
information that triggers a crash. If an attacker can make the web
application generate a memory leak, the application will eventually
consume all memory on the web server and the web server will
crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The security man in Peak company is called Adams. Workers of Peak enter the company by inserting smartcards into the door;
    what way would an attacker likely use to pass through the door?
    A. Shoulder surfing
    B. Dumpster diving
    C. Pharming
    D. Tailgating
A

D. The correct answer is Tailgating. A tailgating attack, also referred
to as “piggybacking,” involves attackers seeking entry to a
restricted area without proper authentication. In it, the perpetrators
can simply follow an authorized person into a restricted location.
They can impersonate delivery men carrying tons of packages,
waiting for an employee to open the door. They can ask the
unknowing target to hold the door, bypassing security measures
like electronic access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A user who is not observant of his physical surrounding can be
    vulnerable to?
    A. Shoulder surfing
    B. Dumpster diving
    C. Pharming
    D. Tailgating
A

A. The correct answer is Shoulder surfing. Shoulder surfing is the
practice of spying on the user of a cash-dispensing machine or
other electronic devices in order to obtain their personal
identification number, password, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A penetration test in which so much detail is given to you about the target network is known as?
    A. Target environment
    B. Known environment
    C. Detailed environment
    D. Network environment
A

B. The correct answer is Known environment. Known environment
or White Box Testing is software testing technique in which internal
structure, design and coding of software are tested to verify flow of
input-output and to improve design, usability and security. In white
box testing, code is visible to testers so it is also called Clear box
testing. In a known environment, the tester is given extensive
knowledge of the target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. A caller tries to trick you by claiming to be in charge of technical security in GT bank, where you work. He claims there is a virus that is spreading on GT bank systems and he needs you to grant him access to your computer so he can prevent it from being affected by the virus. What social engineering principle is this caller using?
    A. Urgency and authority
    B. Urgency and trust
    C. Urgency and scarcity
    D. Urgency and familiarity
A

A. The correct answer is Urgency and authority. The attacker presented the case as needing quick intervention (urgency) and
presented himself as a technical security personnel (authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which type of attack is used to intercept and manipulate calls between the main application’s executable (ex: the browser) and its security mechanisms or libraries on-the-fly?
    A. Man in the browser
    B. Session replays
    C. SQL Injection
    D. Cross-site Scripting
A

A. The correct answer is Man in the browser. The Man-in-theBrowser attack is the same approach as Man-in-the-middle attack,
but in this case is used to intercept and manipulate calls between
the main application’s executable (ex: the browser) and its security
mechanisms or libraries on-the-fly. The most common objective of
this attack is to cause financial fraud by manipulating transactions
of Internet Banking systems, even when other authentication
factors are in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. A malware infection in your company results in a data breach.
    Your coworker reports that she had seen two keyboards plugged
    into a system by the receptionist’s desk. What would you focus on
    finding in this investigation?
    A. Card cloning
    B. Malicious USB cable
    C. Skimming
    D. Malicious flash drive
A

B. The correct answer is Malicious USB cable. A malicious USB
cable is a type of cable that can receive commands from a nearby
smartphone and then execute them over the PC it’s been plugged
into.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. The technical administrator in PHB bank has detected an
    attack in which the attacker’s system is being presented as the server to the bank staff, and the attacker is being presented to the server as the bank staff. What kind of attack is this?
    A. On-path attack
    B. DDoS attack
    C. Evil twin
    D. DNS poisoning
A

A. The correct answer is On-path attack. On-path attackers place
themselves between two devices (often a web browser and a web
server) and intercept or modify communications between the two.
The attackers can then collect information as well as impersonate
either of the two agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A caller has been constantly calling your company line. When the receptionist picks the call, the caller asks some questions and says he is conducting a survey for a non-governmental organization. From the questions he asks, you suspect he is trying to steal information about your company. How would you describe this experience?
    A. Smishing
    B. Vishing
    C. Whaling
    D. Prepending
A

B. The correct answer is Vishing. Vishing is the fraudulent practice
of making phone calls or leaving voice messages purporting to be
from reputable companies in order to induce individuals to reveal
personal information, such as bank details and credit card
numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. After a vulnerability scan, if a company’s wireless router is confirmed to be vulnerable in its web server, what problem should the company address?
    A. Weak encryption protocol
    B. Default credentials
    C. Default WPA settings
    D. Firmware patch management
A

D. The correct answer is Firmware patch management. Patching
provides a mechanism to regularly update features and protect
software with current enhancements and bug fixes, and software
updates for consumer-grade wireless routers are normally executed
as firmware updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Why is it considered a major security problem when memory
    leak occurs?
    A. Memory leak freezes systems for 5 minutes
    B. Memory leak causes crashes
    C. Memory leak sends data to remote servers
    D. Memory leak exposes data
A

B. The correct answer is Memory leak causes crashes. Memory
leaks result in crashes and this in turn culminates in an outage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following attacks is a card reader that can be
    disguised to look like part of an ATM?
    A. Backdoor
    B. Rootkit
    C. Card cloning
    D. Skimming
A

D. The correct answer is Skimming. Skimming is an illegal practice
used by identity thieves to capture credit card information from a
cardholder surreptitiously. Fraudsters often use a device called a skimmer that can be installed at gas pumps or ATM machines to
collect card data. Some machines act like point-of-sale technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. One major difference between active reconnaissance and passive reconnaissance is?
    A. Passive reconnaissance is an attempt to gain information
    about computers without actively engaging with the systems while
    active reconnaissance is an attempt to gain information about
    computers typically by conducting a port scan to find any open
    ports
    B. Active reconnaissance is an attempt to gain information about
    computers without actively engaging with the systems while passive reconnaissance is an attempt to gain information about computers typically by conducting a port scan to find any open ports
    C. Passive reconnaissance is an attempt to gain information
    about computers without any tools while active reconnaissance is an attempt to gain information about computers typically by conducting a port scan to find any open ports
    D. Passive reconnaissance is an attempt to gain information
    about computers without actively engaging with the systems while active reconnaissance is an attempt to gain information about computers typically without any tools
A

A. The correct answer is Passive reconnaissance is an attempt to
gain information about computers without actively engaging with
the systems while active reconnaissance is an attempt to gain
information about computers typically by conducting a port scan to
find any open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A technique which is rarely used in preventing LDAP injection
    attacks is?
    A. Minimize the privileges assigned to the LDAP account
    B. Input validation and encoding
    C. LDAP query parameterization
    D. Escape all variables
A

C. The correct answer is LDAP query parameterization. The LDAP
parameters dialog specifies an LDAP search operation to locate
directory entries and optionally return attributes from those entries.
All the other options are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following is used for keeping internet activity
    anonymous and private, which can be helpful in both legal and
    illegal applications?
    A. Anonymous web
    B. Dark web
    C. Bright web
    D. Google web
A

B. The correct answer is Dark web. The dark web is the hidden
collective of internet sites only accessible by a specialized web
browser. It is used for keeping internet activity anonymous and
private, which can be helpful in both legal and illegal applications.

17
Q
  1. SSL stripping attack can be categorized as…?
    A. A SQL attack
    B. An on-path attack
    C. A pharming attack
    D. A dictionary attack
A

B. The correct answer is An on-path attack. SSL stripping attack is
a kind of on-path attack where an attacker intervenes in the
redirection of the HTTP to the secure HTTPS protocol and
intercepts a request from the user to the server. The attacker will
then continue to establish an HTTPS connection between himself
and the server, and an unsecured HTTP connection with the user,
acting as a “bridge” between them.

18
Q
  1. You have been invited to the international cybersecurity summit to present - in a visual way - real statistics and data about attacks around the world via multiple service providers. Your company wants you to mention the threat intelligence tool you would need. What would you tell them?
    A. A code repository
    B. A vulnerability databases
    C. An automated Indicator Sharing
    D. A threat map
A

D. The correct answer is A threat map. A cyber threat map, also
known as a cyber attack map, is a real-time map of the computer
security attacks that are going on at any given time.

19
Q
  1. While in a public park, you discover a bluetooth connection to your friend’s phone. He tells you he cannot explain where it came from and that he has noticed that whenever he came to the park, data from his phone is always stolen. What can explain this incident?
    A. Bluesnarfing
    B. Bluejacking
    C. Disassociation
    D. Jamming
A

A. The correct answer is Bluesnarfing. Bluesnarfing is the theft of information through Bluetooth. Hackers do it by sneaking into mobile devices—smartphones, laptops, tablets, or personal digital
assistants (PDAs) whose connection has been left open by their owners. It implies exploiting Bluetooth vulnerabilities in order to grab such data as text or email messages, contact lists, and more.

20
Q
  1. A threat hunting method where you pretend to be a malicious
    attacker in order to discover vulnerabilities that may be hidden is
    …?
    A. Threat intelligence
    B. Maneuver
    C. Advisories and bulletins
    D. Threat feeds
A

B. The correct answer is Maneuver. In CompTIA terms, “maneuver”
is often used in threat hunting as: how to think like a malicious user
to help you identify potential indicators of compromise in your
environment