Fundamentals of Information Security: Cybersecurity CH8 Flashcards

1
Q

Choose which statement is wrong by applying your knowledge from the reading.
a. In a MAC cloning attack, a threat actor will discover a valid MAC address of a device connected to a switch, spoof that MAC address on his device, and send a packet onto the network.
b. The goal of an MITM attack is to either eavesdrop on the conversation or impersonate one or both of the parties.
c. A session ID is a unique number that a web browser assigns for the duration of that user’s visit.

A

c. A session ID is a unique number that a web browser assigns for the duration of that user’s visit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Choose which statement is wrong by applying your knowledge from the reading.
a. The Linux text file manipulation tool logger adds content to the syslog file.
b. The tools tracert (Windows) and traceroute (Linux) show the details about the path a packet takes from a computer or device to a destination.
c. Nessus is from Kali Linux

A

c. Nessus is from Kali Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Choose which statement is wrong by applying your knowledge from the reading.
a. An electronic lock is a combination lock that uses buttons that must be pushed in the proper sequence to open the door.
b. A DMZ is also called a physical air gap.
c. A barricade is a short but sturdy vertical post that is used to as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.

A

c. A barricade is a short but sturdy vertical post that is used to as a vehicular traffic barricade to prevent a car from “ramming” into a secured area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which attack intercepts communications between a web browser and the underlying OS?
- Interception
- Man-in-the-browser (MITB)
- DIG
- ARP poisoning

A

Man-in-the-browser (MITB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?
Web server buffer and host DNS server
Reply referrer and domain buffer
Web browser and browser add-on
Host table and external DNS server

A

Host table and external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the result of an ARP poisoning attack?
The ARP cache is compromised.
Users cannot reach a DNS server.
MAC addresses are altered.
An internal DNS must be used instead of an external DNS.

A

The ARP cache is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deacon has observed that the switch is broadcasting all packets to all devices. He suspectsit is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this?
MAC spoofing attack
MAC cloning attack
MAC flooding attack
MAC overflow attack

A

MAC flooding attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tomaso is explaining to a colleague the different types of DNS attacks. Which DNS attack would only impact a single user?
DNS hijack attack
DNS poisoning attack
DNS overflow attack
DNS resource attack

A

DNS poisoning attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?
Network
Application
IoT
Operational Technology

A

Operational Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a reason that threat actors use PowerShell for attacks?
It cannot be detected by antimalware running on the computer.
It leaves behind no evidence on a hard drive.
It can be invoked prior to system boot.
Most applications flag it as a trusted application.

A

It can be invoked prior to system boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a DoS and a DDoS attack?
DoS attacks are faster than DDoS attacks.
DoS attacks use fewer computers than DDoS attacks.
DoS attacks do not use DNS servers as DDoS attacks do.
DoS attacks use more memory than DDoS attacks.

A

DoS attacks use fewer computers than DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT true about VBA?
It is commonly used to create macros.
It is built into most Microsoft Office applications.
It is included in select non-Microsoft products.
It is being phased out and replaced by PowerShell.

A

It is being phased out and replaced by PowerShell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT a Microsoft defense against macros?
Protected View
Trusted documents
Trusted domain
Trusted location

A

Trusted domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use?
Only use compiled and not interpreted Python code.
Use the latest version of Python.
Use caution when formatting strings.
Download only vetted libraries.

A

Only use compiled and not interpreted Python code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Bash?
The command-language interpreter for Linux/UNIX OSs
The open source scripting language that contains many vulnerabilities
A substitute for SSH
The underlying platform on which macOS is built

A

The command-language interpreter for Linux/UNIX OSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Gregory wants to look at the details about the path a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?
tracepacket
trace
tracert
traceroute

A

traceroute

17
Q

Which utility sends custom TCP/IP packets?
curl
hping
shape
pingpacket

A

hping

18
Q

Which of the following is a third-party OS penetration testing tool?
theHarvester
scanless
Nessus
sn1per

A

sn1per

19
Q

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?
head
show
display
cat

A

cat

20
Q

Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior?
Tcpreplay
Tcpdump
Wireshark
Packetdump

A

Tcpreplay

21
Q

Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?
Dual observation protocol (DOP)
Compromise mitigation assessment (CMA)
Two-person integrity/control
Multiplayer recognition

A

Two-person integrity/control

22
Q

Which of the following sensors can detect an object that enters the sensor’s field?
Proximity
Field detection
IR verification
Object recognition

A

Proximity

23
Q

Which of the following does NOT describe an area that separates threat actors from defenders?
DMZ
Air gap
Secure area
Containment space

A

Containment space

24
Q

You are working as a cybersecurity administrator for your country’s government. You are asked to block certain websites in your country deemed critical of those in power. Which of the following methods should you use?
DDoS
MITM
Session replay
DNS poisoning

A

DNS poisoning

25
Q

You are a security expert asked to install physical security equipment in your enterprise. This device should ensure that employee devices are protected from unauthorized access when they are away. Which equipment should you install?
Faraday cage
Bollards
Vaults
Protected cable distribution

A

Vaults

26
Q

Which of the following best describes two-person integrity control?
Assigning two individuals as the head of the organization
Assigning two security guards to protect the building
Assigning two administrators to a single server
Allowing only two people to access specific resources at one time

A

Assigning two security guards to protect the building

27
Q

You are asked to create a certificate signing request for a website that your organization recently developed. Which of the following tools should you use?
OpenSSL
dnsenum
nslookup
theHarvester

A

OpenSSL

28
Q

You are assigned to hunt for traces of a dangerous DNS attack in a network. You need to capture DNS attacks that can compromise DNS replies to all devices in the network. What type of DNS attack should you look for?
DNS amplification attack
DNS poisoning
DNS botnet attack
DNS hijacking

A

DNS hijacking

29
Q

You submitted a network security review report for your organization. After an inspection, the report was returned for corrections with comments from the organizational head. The review report you sent was a pdf file, whereas the returned report was a Microsoft Word file. Word warns you that the file might not be safe to open. Which of the following actions should you take to prevent a possible macros attack?
Designate the file as a trusted document
Open the file in protected view
Delete the file permanently
Move the file to a trusted location

A

Open the file in protected view

30
Q

What is a session ID?
A session ID is a unique number that a web server assigns to a specific user for the duration of the user’s visit.
A session ID is a unique number that a web browser assigns to a specific user for the duration of the user’s visit.
A session ID is a unique number that an ISP assigns to a specific user for the duration of the user’s visit.
A session ID is a unique number that an administrator assigns to a specific user for the duration of the user’s visit.

A

A session ID is a unique number that a web server assigns to a specific user for the duration of the user’s visit.

31
Q

Which of the following tools has a graphical user interface (GUI)?
Wireshark
Traceroute
Tcpdump
Ping

A

Wireshark

32
Q

Which of the following best describes robot sentries?
Robot sentries are robots that have access to an enterprise’s secret data.
Robot sentries are robots that act as fire suppressors.
Robot sentries are robots that have an internal CCTV system installed.
Robot sentries are robots that have access to all the confidential data of an enterprise.

A

Robot sentries are robots that have an internal CCTV system installed.