Exam 3 Flashcards
As part of new hire orientation, a software technician explores the makeup of the organization’s network infrastructure. When reviewing used network appliances and protocols, what provides a bridge between a cabled network and wireless hosts, or stations?
A. Wireless access point
B. Switch
C. Router
D. Transport protocol
A. Wireless access point
A software engineer is tasked with identifying vulnerabilities within the network architecture. When evaluating the use of a particular architecture and selection of controls, what should not be considered as part of architectural considerations?
A. Port security
B.Costs
C. Availability
D. Risk Transference
A. Port security
How can I protect my network from someone who wants to connect a rogue access point to it?
802.1x on a managed switch
What type of attack interferes with my wireless network?
Jamming
My laptop had a virus, so I reinstalled the operating system and the virus came back. What type of attack is causing this?
Rootkit
My domain controller uses NTLM authentication. What type of attack makes it vulnerable?
Pass the Hash Attack
What type of threat actor will try to steal your trade secrets so that they can manufacture your new product and get it to market before you can?
Competitor
Someone goes to the dark web and purchases a program that he can modify to carry out an attack. What type of threat actor is the attacker?
Script kiddie
An attacker has just carried out an attack rendering a website unusable. When he has finished the attack, he then has to rush off, as he is going to attend a political rally. What type of threat actor is he?
Hacktivist
What is the most difficult threat actor to detect and why?
Insider b/c they’re insider your network legitamately
What type of virus produces a different hash as it replicates through your network?
Polymorphic virus
What type of attack can use a hidden password that has been in place since the application was installed?
Backdoor
What type of attack involves an agent attacking a high‐level executive calling them on a telephone and leaving a voicemail?
Vishing
What type of attack involves a huge fireman arriving in the reception area of your company and you letting him into your server room?
Social engineering with urgency
What type of attack involves downloading a performance-enhancing computer program that says that I have 20,000 exploits and that I should purchase the full version of the product to remove them?
Disguised ransomware
What type of attack collects passwords from your computer and sends them back to the hacker who then uses these passwords to gain access to your computer system?
RAT