fqefqf Flashcards
2. Ahmed is a sales manager with a major insurance company. He has received an email that is encouraging him to click on a link and fill out a survey. He is suspicious of the email, but it does mention a major insurance association, and that makes him think it might be legitimate. Which of the following best describes this attack? A. Phishing B. Social engineering C. Spear phishing D. Trojan horse
C. The correct answer is spear phishing. Spear phishing is targeted to a specific group, in this case insurance professionals. Attackers can find individuals from public sources to target. This is known as open source intelligence.
Option A is incorrect because that is too broad a category.
Option B is incorrect because, though social engineering is a part of every phishing attack, this is more than just social engineering.
Option D is incorrect because this is not a Trojan horse. In fact, malware is not even part of the attack.
6. Frank is deeply concerned about attacks to his company’s e-commerce server. He is particularly worried about cross-site scripting and SQL injection. Which of the following would best defend against these two specific attacks? A. Encrypted web traffic B. Filtering user input C. A firewall D. An IDS
B. The primary and best way to defend against the attacks mentioned is filtering user input.
Option A is incorrect. Encrypting the web traffic will not have any effect on these two attacks.
Option C is incorrect. A web application firewall (WAF) might mitigate these attacks, but it would be secondary to filtering user input.
Option D is incorrect. An IDS will simply detect the attack—it won’t stop it.
16. Jared discovers that attackers have breached his WiFi network. They have gained access via the wireless access point (WAP) administrative panel, and have logged on with the credentials the WAP shipped with. What best describes this issue? A. Default configuration B. Race conditions C. Failure to patch D. Weak encryption
A. Credentials the WAP shipped with are an example of default configuration.
Option B is incorrect. Race conditions involve multithreaded applications accessing shared variables.
Option C is incorrect. Patches won’t change the default password.
Option D is incorrect. Encryption does not affect logging into the administrative screen.
- You are responsible for incident response at a mid-sized bank. You have discovered that someone was able to successfully breach your network and steal data from your database server. All servers are configured to forward logs to a central logging server. However, when you examine that central log, there are no entries after 2:13 a.m. two days ago. You check the servers, and they are sending logs to the right server, but they are not getting there. Which of the following would be most likely to explain this?
A. Your log server has a backdoor.
B. Your log server has been hit with a buffer overflow attack.
C. Your switches have been hit with ARP poisoning.
D. Your IDS is malfunctioning and blocking log transmissions.
C. ARP poisoning is used to change the ARP tables routing data to a different MAC address, which would explain why there were no entries.
Option A is incorrect. A backdoor would not explain that the log entries were sent, but not received.
Option B is incorrect. A buffer overflow would not explain that the log entries were sent but not received.
Option D is incorrect. An IDS would not stop log entries even if it was malfunctioning.
19. Coleen is the web security administrator for an online auction website. A small number of users are complaining that when they visit the website and log in, they are told the service is down and to try again later. Coleen checks and she can visit the site without any problem, even from computers outside the network. She also checks the web server log and there is no record of those users ever connecting. Which of the following might best explain this? A. Typosquatting B. SQL injection C. Cross-site scripting D. Cross-site request forgery
A. From the description it appears that they are not logging into the real web server but rather a fake server. That indicates typosquatting: have a URL that is named very similarly to a real site so that when users mistype the real site’s URL they will go to the fake site.
Options B, C, and D are all incorrect. These are all methods of attacking a website, but in this case, the actual website was not attacked. Instead, some users are visiting a fake site
27. While investigating a malware outbreak on your company network, you discover something very odd. There is a file that has the same name as a Windows system DLL, and even has the same API interface, but handles input very differently, in a manner to help compromise the system, and it appears that applications have been attaching to this file, rather than the real system DLL. What best describes this? A. Shimming B. Trojan horse C. Backdoor D. Refactoring
A. Shimming is when the attacker places some malware between an application and some other file, and intercepts the communication to that file (usually to a library or system API).
Option B is incorrect. A Trojan horse might be used to get the shim onto the system, but that is not described in this scenario.
Option C is incorrect. A backdoor is a means to circumvent system authorization and get direct access to the system.
Option D is incorrect. Refactoring is the process of changing names of variables, functions, etc. in a program.
29. Frank is a network administrator for a small college. He discovers that several machines on his network are infected with malware. That malware is sending a flood of packets to a target external to the network. What best describes this attack? A. SYN flood B. DDoS C. Botnet D. Backdoor
B. His machines are part of a distributed denial-of-service attack.
Option A is incorrect. This scenario describes a generic DDoS, not a specific one like SYN
flood.
Option C is incorrect. These machines could be part of a botnet, or just have a trigger that causes them to launch the attack at a specific time. The real key in this scenario is the DDoS attack.
Option D is incorrect. A backdoor gives an attacker access to the target system.
31. When phishing attacks are so focused that they target a specific individual, they are called what? A. Spear phishing B. Targeted phishing C. Phishing D. Whaling
D. Whaling is targeting a specific individual.
Option A is incorrect. Spear phishing targets a small group.
Option B is incorrect. Targeted phishing is not a term used in the industry.
Option C is incorrect. Phishing is the generic term for a wide range of related attacks.
- You are concerned about a wide range of attacks that could affect your company’s web server. You have recently read about an attack wherein the attacker sends more data to the target than the target is expecting. If done properly, this could cause the target to crash.
What would best prevent this type of attack?
A. An SPI firewall
B. An active IDS/IPS
C. Checking buffer boundaries
D. Checking user input
C. You are concerned about buffer overflows, and thus checking buffer boundaries is the best defense.
Options A and B are incorrect. While these technological solutions can always be a benefit for security, they are unlikely to address buffer overflow attacks effectively.
Option D is incorrect. Checking user input helps defend against SQL injection and crosssite scripting.
38. You have noticed that when in a crowded area, you sometimes get a stream of unwanted text messages. The messages end when you leave the area. What describes this attack? A. Bluejacking B. Bluesnarfing C. Evil twin D. Rogue access point
A. Bluejacking involves sending unsolicited messages to Bluetooth devices when they are in range.
Option B is incorrect. Bluesnarfing involves getting data from the Bluetooth device.
Options C and D are incorrect. Evil twin uses a rogue access point whose name is similar or identical to that of a legitimate access point.
40. You have noticed that when in a crowded area, data from your cell phone is stolen. Later investigation shows a Bluetooth connection to your phone, one that you cannot explain. What describes this attack? A. Bluejacking B. Bluesnarfing C. Evil twin D. RAT
B. Bluesnarfing involves accessing data from a Bluetooth device when it is in range.
Option A is incorrect. Bluejacking involves sending unsolicited messages to Bluetooth devices when they are in range.
Option C is incorrect. Evil twin uses a rogue access point whose name is similar or identical to that of a legitimate access point.
Option D is incorrect. A RAT is a remote-access Trojan. Nothing in this scenario points to a RAT being the cause of the stolen data.
41. Louis is investigating a malware incident on one of the computers on his network. He has discovered unknown software that seems to be opening a port, allowing someone to remotely connect to the computer. This software seems to have been installed at the same time as a small shareware application. Which of the following best describes this malware? A. RAT B. Backdoor C. Logic bomb D. Rootkit
A. This is a remote-access Trojan (RAT), malware that opens access for someone to remotely access the system.
Option B is incorrect. A backdoor does provide access but it is usually in the system due to programmers putting it there, not due to malware on the system.
Option C is incorrect. A logic bomb executes its misdeeds when some logical condition is met.
Option D is incorrect. A rootkit provides root or administrative access to the system.
46. Your wireless network has been breached. It appears the attacker modified a portion of data used with the stream cipher and utilized this to expose wirelessly encrypted data. What is this attack called? A. Evil twin B. Rogue WAP C. IV attack D. WPS Attack
C. Initialization vectors are used with stream ciphers. An IV attack attempts to exploit a flaw to use the IV to expose encrypted data.
Options A and B are incorrect. Nothing in this scenario requires or describes a rogue access point/evil twin.
Option D is incorrect. WiFi protected setup (WPS) uses a PIN to connect to the wireless access point (WAP). The WPS attack attempts to intercept that PIN in transmission, connect to the WAP, and then steal the WPA2 password.
47. John is concerned about disgruntled employees stealing company documents and exfiltrating them from the network. He is looking for a solution that will detect likely exfiltration and block it. What type of system is John looking for? A. IPS B. SIEM C. Honeypot D. Firewall
A. Any of these systems could help with detecting malicious activity by an insider, but the intrusion prevention system will block such activity, if detected.
Option B is incorrect. SIEMs simply aggregate logs.
Option C is incorrect. A honeypot can be useful in trapping a malicious actor but not in stopping data exfiltration.
Option D is incorrect. Firewalls can block traffic, but normally data exfiltration looks like normal traffic and is hard for a firewall to block.
57. When an attacker tries to find an input value that will produce the same hash as a password, what type of attack is this? A. Rainbow table B. Brute force C. Session hijacking D. Collision attack
D. A collision is when two different inputs produce the same hash.
Option A is incorrect. A rainbow table is a table of precomputed hashes.
Option B is incorrect. Brute force attempts every possible random combination to get the password or encryption key.
Option C is incorrect. Session hijacking is when the attacker takes over an authenticated session.
78. Zackary is a malware investigator with a cybersecurity firm. He is investigating malware that is able to compromise a target program by finding null references in the target program and dereferencing them, causing an exception to be generated. What best describes this type of attack? A. DLL injection B. Buffer overflow C. Memory leak D. Pointer dereference
D. This is the definition of pointer dereferencing. It is a somewhat obscure and sophisticated attack on a target program.
Option A is incorrect. In a DLL injection, the malware tries to inject code into the memory process space of a library.
Option B is incorrect. In a buffer overflow, the attacker sends more data to a variable than it can hold.
Option C is incorrect. A memory leak occurs when memory is allocated in some programming function but not deallocated. Each time the function is called, more system memory is used up.
79. Frank has just taken over as CIO of a mid-sized insurance company. One of the first things he does is order a thorough inventory of all network equipment. He discovers two routers that are not documented. He is concerned that if they are not documented, they might not be securely configured, tested, and safe. What best describes this situation? A. Poor user training B. System sprawl C. Failure to patch systems D. Default configuration
B. System sprawl occurs when a system grows and there are devices on the system that are not documented.
Options A, C, and D are all incorrect. While these are all serious security issues, they are unrelated to the scenario presented.
81. Daryl is investigating a recent breach of his company’s web server. The attacker used sophisticated techniques and then defaced the website, leaving messages that were denouncing the company’s public policies. He and his team are trying to determine the type of actor who most likely committed the breach. Based on the information provided,who was the most likely threat actor? A. A script B. A nation-state C. Organized crime D. Hacktivists
D. The fact that the website is defaced in a manner related to the company’s public policies is the definition of hacktivism.
Options A, B, and C are incorrect. None of these account for the statements adverse to the company’s policies, which is why hacktivism is the real cause.
- You are investigating a breach of a large technical company. You discover that there have been several different attacks over a period of a year. The attacks were sustained, each lasting several weeks of continuous attack. The attacks were somewhat sophisticated and originated from a variety of IP addresses, but all the IP addresses are within your country.
Which threat actor would you most suspect of being involved in this attack?
A. Nation-state
B. Hacktivist
C. Script kiddie
D. A lone highly skilled hacker
A. The fact that the IP addresses are within your country might make you discard the nation-state attacker, but it is common for nation-state attackers to use compromised IP addresses in the target country from which to attack. The other symptoms—a sophisticated attack, over time—are hallmarks of nation-state attackers.
Option B is incorrect. Nothing in the scenario indicates an ideological motive.
Option C is incorrect. In fact, this attack is the antithesis of the simple attack of a script kiddie.
Option D is incorrect. A lone attacker, no matter how skilled, would have difficulty maintaining sustained attacks over a year.
- Which of the following best describes a zero-day vulnerability?
A. A vulnerability that has been known to the vendor for zero days
B. A vulnerability that has not yet been breached
C. A vulnerability that can be quickly exploited (i.e., in zero days)
D. A vulnerability that will give the attacker brief access (i.e., zero days)
A. This is the definition of a zero-day attack.
Options B, C, and D are incorrect. These do not adequately describe a zero-day attack.
88. Which of the following best describes software that will provide the attacker with remote access to the victim’s machine, but that is wrapped with a legitimate program in an attempt to trick the victim into installing it? A. RAT B. Backdoor C. Trojan horse D. Macro virus
A. A remote access Trojan (RAT) is malware that gives the attacker remote access to the victim machine.
Option B is incorrect. While a backdoor will give access, it is usually something in the system put there by programmers, not introduced by malware.
Option C is incorrect. A RAT is a type of Trojan horse, but Trojan horse is more general than what is described in the scenario.
Option D is incorrect. A macro virus is a virus embedded in a document.
92. You are responsible for technical support at your company. Users are all complaining of very slow Internet connectivity. When you examine the firewall, you find a large number of incoming connections that are not completed, all packets coming from a single IP address. What best describes this attack? A. DDoS B. SYN flood C. Buffer overflow D. ARP poisoning
B. Large, half-open connections are the hallmark of a SYN flood.
Option A is incorrect. These are all coming from a single IP address, so they cannot be a distributed denial-of-service attack.
Option C is incorrect. A buffer overflow seeks to put more data in a variable than it is designed to hold.
Option D is incorrect. ARP poisoning poisons the address resolution table of a switch.
95. Valerie is responsible for security testing applications in her company. She has discovered that a web application, under certain conditions, can generate a memory leak. What, type of attack would this leave the application vulnerable to? A. DoS B. Backdoor C. SQL injection D. Buffer overflow
A. If an attacker can induce the web application to generate the memory leak, then eventually the web application will consume all memory on the web server and the web server will freeze up.
Option B is incorrect. Backdoors are not caused by memory leaks.
Option C is incorrect. SQL injection places malformed SQL into text boxes.
Option D is incorrect. A buffer overflow attempts to put more data in a variable than it can hold.
98. John is responsible for physical security at a large manufacturing plant. Employees all use a smart card in order to open the front door and enter the facility. Which of the following is a common way attackers would circumvent this system? A. Phishing B. Tailgating C. Spoofing the smart card D. RFID spoofing
B. Tailgating involves simply following a legitimate user through the door once he or she
Option A is incorrect. This is unrelated to physical security.
Option C is incorrect. It is possible to generate a fake smartcard, but that is a very uncommon attack.
Option D is incorrect. Again, this is possible but is very uncommon.