Cybersecurity Test Flashcards

1
Q

Malware is discovered in a company. It is able to duplicate itself across the network. What type of malware can it be?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To gain access to your credit card, a person calls your credit card company, mimicking you. What type of attack is this?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You find a seemingly important piece of information, buts authenticity is questionable. What should be the next step?

A

Information comparison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following can be used to perform cyber research?

A

Google search, Wikipedia, forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You can’t access Google.com. However, accessing 216.58.208.46 successfully loads the website. What could be the problem.

A

The DNS fails to connect a URL with an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization hires you to prevent traffic movement from one section of the org to another. Which would you use?

A

Router ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You install VirtualBox and make a VM, but there is no access to Google.com from the machine. What could be the problem?

A

The network adapter is set to internal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature of VirtualBox will solve the problem of VM not being able to start up successfully?

A

Restore the state from a previous snapshot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You cannot access Google.com. You identify a problem with DNS. Which command can you use to troubleshoot the URL to IP?

A

host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are troubleshooting and want to see the routing path traffic takes. Which command do you use?

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

During an investigation, the arp - a command reveals 2 identical MAC addresses. What can be concluded from a diagnosis?

A

The machine is under an MITM arp poisoning attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During an investigation, you need a tool that allows you to see detailed sniffed network traffic. Which tool do you use?

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You click a link via email that sends you to FB. The site wants credit card info. Which attack cycle is this email?

A

Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During an investigation, you search for a .xml file at Mytestsite.com. Which Google dork method would you use to do so?

A

site: mytestsite.com
filetype: xml

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You’re tasked with protecting door locks and fencing for an office. What type of defense is this?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following describes a security flaw that can be exploited by an attacker?
A. Vulnerability
B. Threat
C. Risk
D. Asset
A

Vulnerability