Domain 1 Questions Flashcards
1
A social engineer used a phishing attack to trick users into visiting a website. Once users visit the site, a vulnerability exploit kit installs, which actively exploits vulnerabilities on the client. What type of attack did the users become a victim of?
A Man-in-the-Browser (MitB) attack
Locally Shared Objects (LSOs)
Cross-site Request Forgery (XSRF)
HTTP Response Splitting
A Man-in-the-Browser (MitB) attack
A MitB attack compromises the web browser by installing malicious plug-ins, scripts, or intercepting API calls. Vulnerability exploit kits installed on a website can actively try to exploit vulnerabilities in clients browsing the site.
1
Customers receive a seemingly genuine email from their trusted bank, informing them that their password needs updating. However, when authenticating, an attacker captures the customers’ credentials. What kind of attack did the bank customers experience?
Phishing
SMiShing
Whaling
Vishing
Phishing
Phishing is a combination of social engineering and spoofing, where the attacker sets up a spoof website to imitate a trusted one. The attacker then emails users of the genuine website, informing them that their account must be updated, supplying a disguised link that leads to their spoofed site. When users authenticate with the spoofed site, their logon credentials are captured.
1
A vulnerability database loaded on a scanning tool such as Tenable Nessus will commonly show which of the following properties?
Select all that apply.
Score
Dictionary
Security data inputs
Packet data
Score
Dictionary
Score-Common Vulnerability Scoring System (CVSS) is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). Scores range from 0 (low) to 9+ (critical).
Dictionary-Common Vulnerabilities and Exposures (CVE) is a dictionary of vulnerabilities in published operating systems and applications software provided by cve.mitre.org. It includes CVE ID, brief descriptions, a URL reference list, and data of entry.
1
Multiple private data sources ingest pictures to a machine learning tool on Google Cloud Platform to find specific species of butterflies. The pictures are tagged by creator names in the company before being loaded onto the various data source locations. What type of security solution can the IT team implement to prevent tainted training data from getting to the machine learning tool?
Select all that apply
Use algorithms that use collision avoidance.
Keep ML algorithm a secret.
Use SOAR to check picture properties.
Prevent infiltration of external vendors.
Keep ML algorithm a secret.
Use SOAR to check picture properties.
Security orchestration, automation, and response (SOAR) and automated runbooks could effectively check saved pictures before they are ingested into the machine learning tool. This will prevent malicious data from being ingested.
Machine Learning (ML) algorithm is secrecy by obscurity. An adversarial attack can skew image data by tricking the ML tool to recognize an image as something else if the algorithm is known.
1
Where should a systems administrator search for more information on how to fix a CPU vulnerability on a Dell rack server?
Best Buy Geek Squad
Facebook
Vendor support page
Black Hat conference
Vendor support page
Vendors will provide guides, templates, and tools for configuring and securing operating systems, applications, and physical devices like a rack server. CPU vulnerabilities may require firmware updates that may only be available from the vendor. Conferences are hosted and sponsored by various institutions and provide an opportunity for presentations on the latest threats and technologies. The Black Hat conferences showcase the latest threats and hacker techniques in the industry. Social media platforms, such as Facebook, can showcase “How to” videos and posts, but they are limited. Support files are only available on vendor support pages. A local industry group or company like Best Buy’s Geek Squad helps with smaller commercial and consumer products and is not ideal for rack server related items.
1
Which team performs the offensive role in a penetration exercise?
Red team
White team
Purple team
Blue team
Red team
The red team performs the offensive role to try to infiltrate the target. This team is one of two competing teams in a penetration testing exercise.
1
An attacker evaded antivirus detection in a Linux kernel, as multiple threads attempted to write an object at the same memory location. What type of vulnerability did the attacker use?
A race condition
A pointer dereference
A buffer overflow
An integer overflow
A race condition
A race condition vulnerability occurs when multiple threads are attempting to write at the same memory location. Race conditions can deploy as an anti-virus evasion technique.
1
An attacker came within close proximity of a victim and sent the mobile device user spam of an unsolicited text message. Once the user clicked the link in the message, Trojan malware infected the user’s device. What type of attack did the hacker most likely infect the mobile user with?
Bluesnarfing
Bluejacking
WiPhishing
Skimming
Bluejacking
WHAT YOU NEED TO KNOW
A Bluetooth-discoverable device is vulnerable to bluejacking, similar to spam, where someone sends an unsolicited text (or picture/video) message or vCard (contact details). This can also be a vector for Trojan malware.
1
Security admins are evaluating Windows server vulnerabilities related to Dynamic Link Library (DLL) injections. Modern applications are running on these Windows servers. How would an attacker exploit these vulnerabilities?
Select all that apply
Navigate laterally using pass the hash.
Evade detection through refactoring.
Enable legacy mode through shimming.
Use malware with administrator privilege.
Evade detection through refactoring
Use malware with administrator privilege
The malware must evade detection by anti-virus to be successful. This can be done through code refactoring which means the code performs the same function by using different methods, such as changing its signature.
Dynamic Link Library (DLL) injection is deployed with malware that is already operating on the system with local administrator or system privileges.
1
A hacker can use Microsoft Office applications as an attack vector to automatically run multiple tasks in the background using which of the following?
ARP poisoning
Bash
VBA
PowerShell
VBA
Microsoft Office uses the Visual Basic for Applications (VBA) languages to script macros, for example, in a Word document to carry out multiple tasks automatically.
1
Which of the following are deployed similarly to a credit card skimmer?
Card cloner
Malicious USB plug
Keyloggers
Malicious flash drive
Malicious USB plug
A malicious Universal Serial Bus (USB) charging cable and plug are deployed similar to card skimmers. The device may be placed over a public charging port at airports and other transit locations. The device can then access a smartphone when connected.
1
A threat actor is using which of the following techniques to circumvent the usual authentication method to a remote host?
Keylogger
Rootkit
Backdoor
Logic bomb
Backdoor
A backdoor is any type of access method to a host that circumvents the usual authentication method and gives the remote user administrative control.
1
What would be the highest concern for an e-commerce company whose top priority is to ensure customers can shop online 24/7?
Increase of data breaches
Loss of reputation
Loss of availability
Increase of fines
Loss of availability
Availability loss in this case is losing redundancy in applications and servers that host and run the e-commerce website. Service availability is important to an e-commerce company that advertises 24/7 services.
1
Which attack is a brute-force type that mixes common passwords with usernames?
Dictionary
Skimming
Rainbow
Spraying
Spraying
Password spraying is a horizontal brute-force online attack. The attacker chooses one or more common passwords (for example, password) and tries them in conjunction with multiple usernames.
1
Which principle of social engineering can a threat actor use to get many people to act as others would?
Scarcity
Liking
Consensus
Trust
Consensus
The principle of consensus or social proof refers to techniques that cause many people to act just as others would without force. The attacker can use this instinct to persuade the target that to refuse a request would be odd.