comptia Flashcards

1
Q

Vishing

A

Social engineering over telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

Fraud Attack to obtain information, e.g through email prompting users to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Watering hole attack

A

infecting websites a group of people access to obtain specific information, targeted attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

scarcity

A

business choices to manage the availability of resources to meet human needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

bluesnarfing

A

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS Attack

A

denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

  • Ping of death
  • buffer overflow
  • IP Spoofing
  • consumes bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A sacrificial server on a network to gather

information about intruders. What is this called?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A policy that only allows compliant devices to join their network.

A

Quarantine Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of firewall inspects packets to identify VALID communications?

A

Stateful Inspection Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All viruses are malware - TRUE?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

acronym which describes the duration after which an organisation’s viability
will be permanently threatened, if product and service delivery CANNOT be
resumed?

A

MTPOD (Maximum tolerable period of disruption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device

A

MTTR (mean-time to repair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity

A

RPO (Recovery Point Objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.

A

RTO (Recovery Time Objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol can automatically provide the IP address, subnet mask, default
gateway IP and DNS server IP to a client on a data network?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which feature prevents infected files being installed on a device?

A

Driver Signature Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is used to encrypt files on Microsoft

A

EFS (Encryption file system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network engineer monitors a firewall and notices several suspicious packets have
been dropped. What is in place on the firewall?

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

security protocol and is also one of the

secure encryption systems used in data communication?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which type of tool is used to find modems on networks to initiate an attack from?

A

War-Dialler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIDS

A

Network - Intrusion Detection System
Short for network intrusion detection system, NIDS is a system that attempts to detect hacking activities, denial of service attacks or port scans on a computer network or a computer itself. … The NIDS can monitor incoming, outgoing, and local traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NTFS

A

journaling file system developed by Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

alters the communications between two parties who believe that they are directly communicating with each other.

A

MITM Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

A

MITM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.

A

Cross-site request forgery (CSRF/XSRF)

28
Q

Which type of attack allows for tricking a user into sending unauthorized commands to a web application?

A

(CSRF/XSRF)

29
Q

3 privilege escalation attacks?

A
  • System/application vulnerability
  • Social engineering techniques
  • System/application misconfiguration
30
Q

a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.

A

ARP spoofing or ARP poisoning

31
Q

Which of the attack types listed below relies on the amplification effect?

A

DDOS attack

32
Q

a computer security exploit that takes advantage of vulnerabilities in a user’s web browser application?

A

MITB

33
Q

A technique that allows an attacker to authenticate to a remote server without extracting a cleartext password from the digest and use the digest instead of a password credential is known as:

A

Pass The hash

34
Q

In a session hijacking attack, a hacker takes advantage of the session ID stored in:

A

Cookie

35
Q

A situation in which an application writes to an area of memory that it is not supposed to access is referred to as:

A

Buffer Overflow

36
Q

Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?

A

Integer Overflow

37
Q

an application fails to properly release memory allocated to it or continually requests more memory than it needs

A

Memory Leak

38
Q

The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks. True or False?

A

True

39
Q

precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources

A

DLL (Dynamic-link library)

40
Q

Which of the following terms describes an attempt to read a variable that stores a null value?

A

Pointer Deference

41
Q

Which of the terms listed below describes a type of attack that relies on executing a library of code?

A

DLL Injection

42
Q

True or False, System sprawl is used to describe one of the aspects of poor asset management process.

A

True

43
Q

Which of the following violates the principle of least privilege?

A

Improperly Configured Accounts

44
Q

Resource exhaustion is considered successful in which attack?

A

DoS attack

45
Q

After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:

A

Improper error Handling

46
Q

Ports 20/21

A

FTP

47
Q

Port 22

A

SSH

48
Q

Port 25?

A

SMTP

49
Q

Port 53

A

DNS

50
Q

POP2 / POP3 Ports?

A

109/110

51
Q

SFTP port

A

115

52
Q

Port 123

A

NTP

53
Q

IMAP ver3 port?

A

220

54
Q

Port 23

A

Telnet

55
Q

HTTP port?

A

Port 80

56
Q

TFTP port?

A

Port 69

57
Q

SNMP port?

A

Port 161

58
Q

LDAP port?

A

Port 389

59
Q

HTTPS port?

A

443

60
Q

DHCP port?

A

67

61
Q

A malfunction in preprogrammed sequential access to a shared resource is described as

A

Race Condition

62
Q

Backdoor

A

Using tools to examine the internal operations of a program

63
Q

Which type of attack denies authorised users access to network resources?

A

DoS

64
Q

Which Type of attack uses more than one computer to attack the victims

A

DDos Attack

65
Q

An alert signals you that a server in your network has a program running on it that bypasses authorisation . Which type of attack has occurred

A

Backdoor

66
Q

You’ve discovered an expired certificate is being used repeatedly to gain logon privileges. What type of attack is this?

A

Replay Attack