CompTIA Security+ Certification Exam SY0-701 Practice Test 7 Flashcards

1
Q

Exploiting known vulnerability is a common threat vector for:

A)Legacy systems/apps
B) Unsupported systems/apps
C) Newly released systems/apps
D)Systems/apps with zero-day vulnerability

A

B) Unsupported systems/apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:

A) WPA
B) WPS
C) WEP
D) WAP

A

B) WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the wireless technologies listed below are considered potential threat vectors and should be avoided due to their known vulnerabilities? (Select all that apply)

A) WPS
B) WAP
C) WPA
D) WAF
E) WPA2
F) WEP

A

A) WPS
C) WPA
E) WPA2
F) WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The term “Evil twin” refers to a rogue WAP set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate AP and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate AP to connecting hosts.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following answers refers to a threat vector characteristic only to wired networks?

A) ARP Spoofing
B) VLAN hopping
C) Cable tapping
D) Port sniffing
E) All of the above

A

C) Cable tapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of threat vectors related to Bluetooth communication include: bluesmacking (a type of DoS attack that targets Bluetooth devices by overwhelming them with excessive traffic), bluejacking (the practice of sending unsolicited messages or data to a Bluetooth-enabled device), bluesnarfing (gaining unauthorized access to a Bluetooth device and data theft), and bluebugging (gaining remote control over a Bluetooth device).

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refers to the most probable cause of an unauthorized access caused by the exploitation of a specific network entry point?

A) Outdated AV software
B) Browser cookies
C) Open service ports
D) Insufficient logging and monitoring

A

C) Open service ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The importance of changing default usernames and passwords can be illustrated by the example of certain network devices (such as routers), which are often shipped with default and well-known admin credentials that can be looked up on the web.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following would be the best solution for a company that needs IT services but lacks any IT personnel?

A) MSA
B) MaaS
C) MSP
D) MSSP

A

C) MSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the terms listed below refers to a third-party vendor offering IT security management services?

A) MSP
B) MaaS
C) MSA
D) MSSP

A

D) MSSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refer to common threat vectors that apply to MSPs, vendors, and suppliers in the supply chain? (Select 2 answers)

A) Compliance violations
B) Brand reputation damage
C) Propagation of malware
D) Operational disruptions
E) Social engineering techniques

A

C) Propagation of malware

E) Social engineering techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:

A) Phishing
B) Smishing
C) Pharming
D) Spoofing

A

A) Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which social engineering attack relies on identity theft?

A) Pretexting
B) Spear phishing
C) Tailgating
D) Impersonation

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A BEC attack is an example of:

A) Smishing
B) Phishing
C) Vishing
D) Pharming

A

B) Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a social engineering technique where an attacker creates a false scenario or situation to deceive the victim into revealing sensitive information?

A) Impersonation
B) Credential harvesting
C) Pretexting
D) Watering hole attack

A

C) Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following terms refers to a platform used for watering hole attacks?

A) Mail gateways
B) Websites
C) PBX systems
D) Web browsers

A

B) Websites

17
Q

The term “URL hijacking” (a.k.a. “Typosquatting”) refers to a deceptive practice involving the deliberate registration of domain names with misspellings or slight variations that closely resemble well-established and popular domain names. The primary goal of this strategy is to exploit the common typographical errors made by users while entering URLs into their web browser’s address bar. Beyond capturing inadvertent traffic, typosquatting may also be used for hosting phishing sites to trick users into divulging sensitive information, distributing malware through deceptive websites, generating ad revenue by redirecting mistyped traffic, or engaging in brand impersonation to harm the reputation of authentic brands or deceive users.

A) True

B) False

A

A) True

18
Q

Which type of application attack relies on introducing external code into the address space of a running program?

A) Buffer overflow
B) Memory injection
C) Replay attack
D) Pointer dereference

A

B) Memory injection

19
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:

A) DLL
B) API
C) EXE
D) INI

A

A) DLL

20
Q

Which of the answers listed below refers to an application attack that relies on executing a library of code?

A) Memory leak
B) DLL injection
C) Pointer dereference
D Buffer overflow

A

B) DLL injection

21
Q

A type of exploit in which an application overwrites the contents of a memory area it should not have access to is called:

A) DLL injection
B) Buffer overflow
C) Memory leak
D) Privilege escalation

A

B) Buffer overflow

22
Q

A malfunction in a preprogrammed sequential access to a shared resource is described as:

A) Race condition
B) Concurrency error
C) Multithreading
D) Synchronization error

A

A) Race condition

23
Q

A type of vulnerability where the state of a resource is verified at one point in time but may change before the resource is actually used is referred to as:

A) TOC
B) TOC/TOU
C) TOU
D) TSIG

A

B) TOC/TOU

24
Q

A malicious application update is a type of malware that can be installed through a seemingly legitimate software update. The introduction of a malicious update into the application code can be enabled through various means, including:

A) Unsigned application code

B) Unencrypted update channel (HTTP vs HTTPS)

C)Fake update website

D) Unauthorized access to update server

E) Compromised software development process

F) All of the above

A

F) All of the above

25
Q

Which of the following answers does not refer to a common type of OS-based vulnerability?

A) Access control and permissions vulnerabilities (weak passwords, privilege escalation)

B) Vulnerabilities in installed applications, system utilities, and device drivers

C) Memory-related vulnerabilities (memory leaks, buffer overflows, race conditions)

D) Patch and update management vulnerabilities (security patch and update delays, malicious updates)

E) Vulnerabilities related to system/security misconfigurations

F) Network-related vulnerabilities (DoS attacks, remote code execution attacks)

G) All of the above answer choices are examples of OS-based vulnerabilities

A

G) All of the above answer choices are examples of OS-based vulnerabilities