Incorrect Study Questions Flashcards
Frank wants to verify that no unnecessary ports and services are available on his systems, but he cannot run a vulnerability scanner. What is his best option?
- Passive network capture to detect services
- Configuration review
configuration review
Ahmed has hundreds of systems spread across multiple locations and wants to better handle the amount of data that they create. Which of the following two technologies can help?
- snetiment analysis and user behaviour analysis
- security monitoring and log collectors
- packet capture and log aggregation
- log aggregation and log collectors
4
Frank finds that an attacker has used a vulnerability in a web app that his company runs and has then used that exploit to obtain root privileges on the web server. Which of the following types of attacks has he found?
Privilege escelation
cross-site scripting
Privilege escelation
Which of the following types of penetration tests is being done when the tester is suplied with extensive knowledge of the target network?
Full disclosure
Known environment
Known environment
Which of the following are the two most common goals of invoice scams?
Receiving money or stealing cryptocurrency
Receiving money or acquiring credentials
receiving money or aquiring credentials
What browser feature is used to help prevent successful URL redirection attacks?
displaying the full real URL
cert expiration tracking
enabling javascript
disabiling cookies
displaying the full real URL
Which of the following types of attacks is an SSL stripping attack?
Downgrade attack
on-path attack
on-path attack
A penetration tester calls a staff member for her target organization and introduces herself as a member of the IT team. She inquires if the staff member has addressed a problem with their system, then proceeds to ask for details about the individual, claiming she needs to verify that she is talking to the right person. Which of the following types of social engineering attack is this?
watering hole
pretexting
shoulder surfing
prepending
pretexting
- Social engineering type that involves using false motive and lyting to obtain information