CompTIA Security+ Certification Exam SY0-701 Practice Test 7 Flashcards
Exploiting known vulnerability is a common threat vector for:
A)Legacy systems/apps
B) Unsupported systems/apps
C) Newly released systems/apps
D)Systems/apps with zero-day vulnerability
B) Unsupported systems/apps
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:
A) WPA
B) WPS
C) WEP
D) WAP
B) WPS
Which of the wireless technologies listed below are considered potential threat vectors and should be avoided due to their known vulnerabilities? (Select all that apply)
A) WPS
B) WAP
C) WPA
D) WAF
E) WPA2
F) WEP
A) WPS
C) WPA
E) WPA2
F) WEP
The term “Evil twin” refers to a rogue WAP set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate AP and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate AP to connecting hosts.
A) True
B) False
A) True
Which of the following answers refers to a threat vector characteristic only to wired networks?
A) ARP Spoofing
B) VLAN hopping
C) Cable tapping
D) Port sniffing
E) All of the above
C) Cable tapping
Examples of threat vectors related to Bluetooth communication include: bluesmacking (a type of DoS attack that targets Bluetooth devices by overwhelming them with excessive traffic), bluejacking (the practice of sending unsolicited messages or data to a Bluetooth-enabled device), bluesnarfing (gaining unauthorized access to a Bluetooth device and data theft), and bluebugging (gaining remote control over a Bluetooth device).
A) True
B) False
A) True
Which of the answers listed below refers to the most probable cause of an unauthorized access caused by the exploitation of a specific network entry point?
A) Outdated AV software
B) Browser cookies
C) Open service ports
D) Insufficient logging and monitoring
C) Open service ports
The importance of changing default usernames and passwords can be illustrated by the example of certain network devices (such as routers), which are often shipped with default and well-known admin credentials that can be looked up on the web.
A) True
B) False
A) True
Which of the following would be the best solution for a company that needs IT services but lacks any IT personnel?
A) MSA
B) MaaS
C) MSP
D) MSSP
C) MSP
Which of the terms listed below refers to a third-party vendor offering IT security management services?
A) MSP
B) MaaS
C) MSA
D) MSSP
D) MSSP
Which of the following answers refer to common threat vectors that apply to MSPs, vendors, and suppliers in the supply chain? (Select 2 answers)
A) Compliance violations
B) Brand reputation damage
C) Propagation of malware
D) Operational disruptions
E) Social engineering techniques
C) Propagation of malware
E) Social engineering techniques
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
A) Phishing
B) Smishing
C) Pharming
D) Spoofing
A) Phishing
Which social engineering attack relies on identity theft?
A) Pretexting
B) Spear phishing
C) Tailgating
D) Impersonation
Impersonation
A BEC attack is an example of:
A) Smishing
B) Phishing
C) Vishing
D) Pharming
B) Phishing
Which of the answers listed below refers to a social engineering technique where an attacker creates a false scenario or situation to deceive the victim into revealing sensitive information?
A) Impersonation
B) Credential harvesting
C) Pretexting
D) Watering hole attack
C) Pretexting