Fundamentals of Information Security: Cybersecurity CH8 Flashcards
Choose which statement is wrong by applying your knowledge from the reading.
a. In a MAC cloning attack, a threat actor will discover a valid MAC address of a device connected to a switch, spoof that MAC address on his device, and send a packet onto the network.
b. The goal of an MITM attack is to either eavesdrop on the conversation or impersonate one or both of the parties.
c. A session ID is a unique number that a web browser assigns for the duration of that user’s visit.
c. A session ID is a unique number that a web browser assigns for the duration of that user’s visit.
Choose which statement is wrong by applying your knowledge from the reading.
a. The Linux text file manipulation tool logger adds content to the syslog file.
b. The tools tracert (Windows) and traceroute (Linux) show the details about the path a packet takes from a computer or device to a destination.
c. Nessus is from Kali Linux
c. Nessus is from Kali Linux
Choose which statement is wrong by applying your knowledge from the reading.
a. An electronic lock is a combination lock that uses buttons that must be pushed in the proper sequence to open the door.
b. A DMZ is also called a physical air gap.
c. A barricade is a short but sturdy vertical post that is used to as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.
c. A barricade is a short but sturdy vertical post that is used to as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.
Which attack intercepts communications between a web browser and the underlying OS?
- Interception
- Man-in-the-browser (MITB)
- DIG
- ARP poisoning
Man-in-the-browser (MITB)
Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?
Web server buffer and host DNS server
Reply referrer and domain buffer
Web browser and browser add-on
Host table and external DNS server
Host table and external DNS server
What is the result of an ARP poisoning attack?
The ARP cache is compromised.
Users cannot reach a DNS server.
MAC addresses are altered.
An internal DNS must be used instead of an external DNS.
The ARP cache is compromised.
Deacon has observed that the switch is broadcasting all packets to all devices. He suspectsit is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this?
MAC spoofing attack
MAC cloning attack
MAC flooding attack
MAC overflow attack
MAC flooding attack
Tomaso is explaining to a colleague the different types of DNS attacks. Which DNS attack would only impact a single user?
DNS hijack attack
DNS poisoning attack
DNS overflow attack
DNS resource attack
DNS poisoning attack
Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?
Network
Application
IoT
Operational Technology
Operational Technology
Which of the following is NOT a reason that threat actors use PowerShell for attacks?
It cannot be detected by antimalware running on the computer.
It leaves behind no evidence on a hard drive.
It can be invoked prior to system boot.
Most applications flag it as a trusted application.
It can be invoked prior to system boot.
What is the difference between a DoS and a DDoS attack?
DoS attacks are faster than DDoS attacks.
DoS attacks use fewer computers than DDoS attacks.
DoS attacks do not use DNS servers as DDoS attacks do.
DoS attacks use more memory than DDoS attacks.
DoS attacks use fewer computers than DDoS attacks.
Which of the following is NOT true about VBA?
It is commonly used to create macros.
It is built into most Microsoft Office applications.
It is included in select non-Microsoft products.
It is being phased out and replaced by PowerShell.
It is being phased out and replaced by PowerShell.
Which of the following is NOT a Microsoft defense against macros?
Protected View
Trusted documents
Trusted domain
Trusted location
Trusted domain
Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use?
Only use compiled and not interpreted Python code.
Use the latest version of Python.
Use caution when formatting strings.
Download only vetted libraries.
Only use compiled and not interpreted Python code.
What is Bash?
The command-language interpreter for Linux/UNIX OSs
The open source scripting language that contains many vulnerabilities
A substitute for SSH
The underlying platform on which macOS is built
The command-language interpreter for Linux/UNIX OSs