CompTIA Security+ Get Certified Get Ahead - CH6 Review Flashcards

1
Q

A tech company recently discovered an attack on its organization, resulting in a significant data breach of customer data. After investigating the attack, they realized it was very sophisticated and likely originated from a foreign country. Which of the following identifies the MOST likely threat actor in this attack?

Hactivist
APT
Competitors
Insiders

A

APT (Advanced Persistent Threat)

Explanation:
This was most likely an advanced persistent threat (APT) because it was a sophisticated attack and originated from a foreign country.

A hacktivist launches attacks to further a cause, but the scenario didn’t mention any cause.
Competitors might launch attacks, but they would typically focus on proprietary data rather than customer data.
An insider would not launch attacks from a foreign country.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 631-632). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker purchased an exploit on the Internet. He then used it to modify an item’s price in an online shopping cart during checkout. Which of the following BEST describes this attacker?

Insider
Script Kiddie
Competitor
Hactivist
APT

A

Script Kiddie

Explanation:
A script kiddie will typically obtain a ready-made exploit rather than code it himself.

An insider would cause damage from within the network or use inside knowledge when attacking.
A competitor is unlikely to purchase a single item at a lower price but would be more interested in gaining proprietary data.
Hacktivists launch attacks as part of an activist movement, not to get a better price on an item.
An advanced persistent threat (APT) is typically a state actor sponsored by a nation-state and will use advanced tools to launch sophisticated attacks, rather than just lowering a price for an item.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 632). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lisa is a database administrator. She received a phone call from someone identifying himself as a representative from a known hardware vendor. He said he’s calling customers to inform them of a problem with database Servers they’ve sold, but he said the problem only affects Servers running a specific operating system version. He asks Lisa what operating system versions the company is running on their database Servers. Which of the following BEST describes the tactic used by the caller in this scenario?

Pretexting
Tailgating
Pharming
Smishing

A

Pretexting

Explanation:
The caller is using the social engineering tactic of pretexting by setting up a scenario that has a better chance of getting someone to give him information. If he just asked for the operating system versions on the servers without a prepended scenario, his chance of success would be diminished.

Tailgating is the practice of one person following closely behind another without showing credentials.
A pharming attack attempts to manipulate the DNS name resolution process.
Smishing is a form of phishing using text messages.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 632). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker recently attacked a web Server hosted by your company. After investigating the attack, Security professionals determined that the attacker used a previously unknown application exploit. Which of the following BEST identifies this attack?

Buffer Overflow
Zero-day Attack
Man-in-the-Browser
Integer Overflow

A

Zero-day Attack

Explanation:
A zero-day attack takes advantage of an undocumented exploit or an exploit that is unknown to the public.

A buffer overflow attack sends unexpected data to a system to access system memory or cause it to crash. Although some buffer overflow attacks are unknown, others are known. If the server isn’t kept up to date with patches, it can be attacked with a known buffer overflow attack.
A man-in-the-browser attack is a type of proxy Trojan horse that takes advantage of vulnerabilities in web browsers, not web servers.
An integer overflow attack attempts to use or create a numeric value that is too big for an application to handle.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 632-633). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

After Bart logged on to his computer, he was unable to access any data. Instead, his screen displayed a message indicating that unless he made a payment, his hard drive would be formatted, and he’d permanently lose access to his data. What does this indicate?

Keylogger
Ransomware
Backdoor
Trojan

A

Ransomware

Explanation:
Ransomware attempts to take control of user’s system or data and then demands payment (ransom) to return control.

Keyloggers capture a user’s keystrokes and store them in a file. This file can be automatically sent to an attacker or manually retrieved depending on the keylogger.
It’s possible that Bart’s computer was infected with a Trojan, which created a backdoor.
However, not all Trojans or backdoor accounts demand payment as ransom.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 633). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Recently, malware on a computer at the Monty Burns Casino destroyed several important files after it detected that Homer was no longer employed at the casino. Which of the following BEST identifies this malware?

Logic Bomb
Rootkit
Backdoor
Spyware

A

Logic Bomb

Explanation:
A logic bomb executes in response to an event. In this scenario, the logic bomb is delivering its payload when it detects that Homer is no longer employed at the company.

A rootkit doesn’t respond to an event.
A backdoor provides another method of accessing a system, but it does not delete files.
Spyware is software installed on user systems without their awareness or consent.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 633). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Maggie was on the programming team that developed an application used by your Human Resources department. Personnel use this application to store and manage employee data. Maggie programmed in the ability to access this application with a username and password that only she knows to perform remote maintenance on the application if necessary. Which of the following does this describe?

Virus
Worm
Backdoor
Trojan

A

Backdoor

Explanation:
A backdoor provides someone an alternative way of accessing a system or application, which is what Maggie created in this scenario. It might seem as though she’s doing so with good intentions, but if attackers discover a backdoor, they can exploit it.

A virus is malicious code that attaches itself to an application and executes when the application runs, not code that is purposely written into the application.
A worm is self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.
A Trojan is software that looks like it has a beneficial purpose but includes a malicious component.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 633). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

** Homer complained of abnormal activity on his workstation. After investigating, an administrator discovered his workstation connects to systems outside the organization’s internal Network using uncommon ports. The administrator discovered the workstation is also running several hidden processes. Which of the following choices BEST describes this activity?

Rootkit
Backdoor
Spam
Trojan

A

Rootkit

Explanation:
A rootkit typically runs hidden processes and it commonly attempts to connect to computers via the Internet. The scenario doesn’t address the initial infection.

Although an attacker might have used a backdoor to access the user’s computer and install the rootkit, backdoors don’t run hidden processes.
A Trojan is malware that looks like it’s beneficial, but it is malicious.
Spam is unwanted email and is unrelated to this question.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 633-634). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bart downloaded and installed the nmap Security scanner from https://passsecurityplus.com. After completing the install, he noticed that his browser’s home page and default search engine was changed. What is the MOST likely cause of this activity?

PUP
Fileless Virus
Worm
Rootkit

A

PUP (Potentially Unwanted Program)

Explanation:
A potentially unwanted program (PUP) is installed along with a desired program, and many PUPs hijack browsers by changing the home page and/or changing the default search engine. Because the user downloaded nmap from a site other than nmap.org, it is conceivable that the alternative site added PUPs to the nmap program.

A fileless virus is a type of malicious software that runs in memory, often within a PowerShell script, instead of being a file that is written to disk.
A worm is self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.
A rootkit is a program or group of programs that provide root-level access to a system.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 634). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

** Your SIEM system alerted on potential malicious activity from a system in your Network. After investigating the alert, you determine it was generated after it detected suspicious activity generated through a PowerShell script. Additionally, you verified that the system is sending traffic to and from an unknown IP address in the Internet. Which of the following is the BEST description of this threat?

Ransomeware
Fileless Virus
Command and Control
Rootkit

A

Fileless Virus

Explanation:
This describes a fileless virus, which commonly injects PowerShell commands into existing scripts. Security information and event management (SIEM) systems can be configured to send alerts when PowerShell commands are detected.

Ransomware typically encrypts data and the attacker then demands payment as ransom, but there isn’t any indication that a ransom is requested in this scenario.
The fileless virus may have joined the computer to a botnet and the traffic to and from the unknown IP address may be a connection to a command and control server. However, there isn’t enough information to make this conclusion.
A rootkit is a program or group of programs that provide root-level access to a system and hides itself to evade detection.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 634). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A man in a maintenance uniform walked up to your organization’s receptionist desk. He said he was called by the CIO and asked to fix an issue with the phones and needed access to the wiring closet. The receptionist asked the man to show his building access badge, and then she verified that he was on the list of approved personnel to access this secure area. What type of attack will the checks performed by the receptionist prevent?

Tailgating
Phishing
Impersonation
Whaling
Prepending

A

Impersonation

Explanation:
These checks are security controls that will help prevent impersonation, a social engineering attack.

Tailgating is the practice of one person following closely behind another without showing credentials.
Phishing is the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.
Whaling is a form of spear phishing that attempts to target high-level executives. By first saying that he was called by the chief information officer (CIO), he was using prepending to add the impression of validity to his request.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 635). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization’s Security policy requires employees to place all discarded paper documents in containers for temporary storage. These papers are later burned in an incinerator. Which of the following attacks are these actions MOST likely trying to prevent?

Shoulder Surfing
Tailgating
Smishing
Dumpster Diving

A

Dumpster Diving

Explanation:
Dumpster diving is the practice of looking for documents in the trash dumpsters, but shredding or incinerating documents ensures dumpster divers cannot retrieve any paper documents.

Shoulder surfers attempt to view something on a monitor or other screen, not papers.
Tailgating refers to entering a secure area by following someone else.
Smishing is a form of phishing using text messages.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 635). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Lisa is a database administrator and received a phone call from someone identifying himself as a technician working with a known hardware vendor. He said he’s calling customers to inform them of a problem with database Servers they’ve sold, but he said the problem only affects Servers running a specific operating system version. He asks Lisa what operating system versions the company is running on their database Servers. Which of the following choices is the BEST response from Lisa?

Let the caller know what operating system and versions are running on the database Servers to determine if any further action is needed.

Thank the caller and end the call, report the call to her supervisor, and independently check the vendor for issues.

Ask the call for his phone number so that she can call him back after checking the Servers.

Contact law enforcement personnel because this is a Pretexting Attack.

A

Thank the caller and end the call, report the call to her supervisor, and independently check the vendor for issues.

Explanation:
This sounds like a social engineering attack where the caller is attempting to get information on the servers, so it’s appropriate to end the call, report the call to a supervisor, and independently check the vendor for potential issues.

It is not appropriate to give external personnel information on internal systems from a single phone call.
It isn’t necessary to ask for a phone number because you wouldn’t call back and give information on the servers.
While the caller is pretexting the request with a somewhat believable scenario, the caller has not committed a crime by asking questions, so it is not appropriate to contact law enforcement personnel.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 635). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Homer, the chief financial officer (CF) of a bank, received an email from Lisa, the company’s chief executive officer (CEO). Lisa states she is on vacation and lost her purse, containing all her cash and credit cards. She asks Homer to transfer $5,000 to her account. Which of the following BEST identifies this attack?

Phishing
Vishing
Smishing
Whaling

A

Whaling

Explanation:
This is most likely a whaling attack because an executive (the CFO of the bank) is being targeted.

While whaling is a type of phishing, whaling is more specific and a better answer than phishing.
Vishing is a form of phishing that uses the phone, but this scenario used email.
Smishing is a form of phishing that uses text messages.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 635-636). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Homer has been looking for the newest version of a popular smartphone. However, he can’t find it in stock anywhere. Today, he received an email advertising the smartphone. After clicking the link, his system was infected with malware. Which of the following principles is the email sender employing?

Authority
Intimidation
Scarcity
Trust

A

Scarcity

Explanation:
The attacker is using scarcity to entice the user to click the link. A user might realize that clicking on links from unknown sources is risky, but the temptation of getting a new smartphone might cause the user to ignore the risk.

There isn’t any indication that the email is from any specific authority.
It isn’t trying to intimidate the recipient, and there isn’t any indication it is trying to build trust.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 636). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The CEO of a company recently received an email. The email indicates that her company is being sued and names her specifically as a defendant in the lawsuit. It includes an attachment and the email describes the attachment as a subpoena. Which of the following BEST describes the social engineering principle used by the sender in this scenario?

Whaling
Phishing
Consensus
Authority

A

Authority

Explanation:
The sender is using the Social Engineering principle of Authority in this scenario. The CEO would respect legal Authorities and might be more inclined to open an attachment from such an Authority.

While the scenario also describes Whaling, a specific TYPE of Phishing Attack, Whaling and Phishing are Attacks, NOT Social Engineering Principles.
Consensus attempts to show that other people like a product and is also a Social Engineering Principle, but not in this scenario.

17
Q

The Marvin Monroe Memorial Hospital recently suffered a serious attack. The attackers notified management personnel that they encrypted a significant amount of data on the hospital’s Servers and it would remain encrypted until the management paid a hefty sum to the attackers. Which of the following identifies the MOST likely threat actor in this attack?

Organized Crime
Ransomeware
Competitors
Hacktivist

A

Organized Crime

Explanation:
My Take: The key to the question is they are identifying the Threat Actor, not the Type of Attack. The Type of Attack is Ransomware, but the Threat Actors that carry out those types of Attacks, in this scenario the best answer would have been Organized Crime.

18
Q

Your organization recently suffered a loss from malware that was not previously known by any Trusted sources. Which of the following BEST describes this attack?

Phishing
Zero-day
Open-source Intelligence
Hoax

A

Zero-day

Explanation:
A Zero-day exploit is one that isn’t known by a trusted source such as antivirus vendors or operating system vendors.

Attackers use Open-source Intelligence to identify a target. Some typical sources are social media sites and news outlets.
A hoax is not a specific attack

19
Q

Dr. Terwilliger installed code designed to enable his account automatically if he ever lost his job as a sidekick on a Television show. The code was designed to reenable his account three days after it is disabled. Which of the following does this describe?

Logic Bomb
Rootkit
Spyware
Ransomware

A

Logic Bomb

20
Q

While cleaning out his desk, Bart threw several papers containing PII into the recycle bin. Which type of attack can exploit this action?

Vishing
Dumpster Diving
Shoulder Surfing
Tailgating

A

Dumpster Diving