other FT questions Flashcards

1
Q

What is used in URL Phishing?

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A situation where a cryptographic hash function produces two different digests for the same data input is referred to as a hash collision.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’; is an example of what type of attack?

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.

A

DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A situation in which an application writes to an area of memory it is not supposed to have access to.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malfunction in a preprogrammed sequential access to a shared resource.

A

Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions.

A

SSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works.

A

White-box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: In cybersecurity exercises, purple team combines the roles of all other teams (i.e. red, blue, and white).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What state of digital data requires data to be processed in an unencrypted form?

A

In processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data.

A

Hot site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A disaster recovery facility that provides only the physical space for recovery operations.

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software

A

IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems.

A

RTOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An integrated circuit combining components normally found in a standard computer system.

A

SoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T or F: One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The best solution for a company that needs IT services but lacks any IT personnel?

A

MSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A third-party vendor offering IT security management services?

A

MSSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T or F: The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The concept of virtualization on an application level.

A

Containerization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Usage audit and Asset documentation are security measures can be used to prevent:

A

VM Sprawl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

T or F: Code obfuscation techniques rely on encryption to protect the source code against unauthorized access.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A collection of commonly used programming functions designed to speed up software development process is known as:

A

Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Refers to a specialized suite of software tools used for developing applications for a specific platform.

A

SDK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A nonprofit organization focused on software security.

A

OWASP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A security feature used in Bluetooth device pairing.

A

PIN code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Software that enables a centralized administration of mobile devices.

A

MDM

32
Q

T or F: The term “Push notification” is used to describe information delivery from a server to a client performed without a specific request from the client.

A

True.

33
Q

In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:

A

Containerization

34
Q

A mobile security solution that enables separate controls over the user and enterprise data is called:

A

Storage segmentation

35
Q

A software tool that provides a single management interface for mobile devices, PCs, printers, IoT devices and wearables.

A

UEM

36
Q

The term “Rooting” refers to the capability of gaining administrative access to the operating system and system applications on:

A

Android devices

37
Q

A monitoring port on a network device is referred to as:

A

Tap

38
Q

Wireless security protocol that has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws.

A

WEP

39
Q

Encryption scheme is used in WiFi Protected Access 2 (WPA2)

A

AEP-CCMP

40
Q

A client authentication method used in WPA2 Personal mode.

A

PSK

41
Q

A client authentication method used in WPA3 Personal mode.

A

SAE

42
Q

EAP method that offers the highest level of security.

A

EAP-TLS

43
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as:

A

WPS

44
Q

What wireless technologies are deprecated and should not be used due to their known vulnerabilities?

A

WPS and WEP

45
Q

A common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments.

A

Omnidirectional antenna

46
Q

SSL stripping is an example of:

A

Brute Force and Downgrade attack.

47
Q

A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:

A

Pass the hash.

48
Q

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

A

RFID

49
Q

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?

A

ARP poisoning

50
Q

An account policy setting that forces users to come up with a new password every time they are required to change their old password is called

A

Password history

51
Q

During a password reminder procedure the system asks security question that covers personal details that should be known only to the user (e.g. user’s favorite holiday destination). This type of authentication method is an example of:

A

KBA

52
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:

A

SSO

53
Q

OpenID Connect is a protocol used for:

A

Authentication

54
Q

OAuth is an open standard for:

A

Authorization

55
Q

T or F: A common implementation of identity and access controls used in federated SSO systems includes OpenID Connect and Oauth 2.0 used in conjunction to provide authentication and authorization services.

A

True

56
Q

What protocol ensures the reliability of the Kerberos authentication process?

A

NTP

57
Q

A Linux command that allows to display the beginning of a file (by default its first 10 lines) is known as:

A

head

58
Q

A Linux command that allows to create, view, and concatenate files is called:

A

cat

59
Q

A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:

A

grep

60
Q

A software library used to implement encrypted connections?

A

OpenSSL

61
Q

A Command-Line Interface (CLI) packet-crafting tool?

A

Tcpreplay

62
Q

A Command-Line Interface (CLI) packet-capturing tool used in Unix-like operating systems.

A

tcpdump

63
Q

A Linux command-line utility that can be used in the forensic process for creating and copying image files is called:

A

dd

64
Q

A multi-function disk and binary data editor used for low-level data processing, data recovery, and digital forensics.

A

WinHex

65
Q

An open-source forensics platform that allows to examine the contents of a hard drive or mobile device and recover evidence from it.

A

Autopsy

66
Q

What is Metasploit?

A

Exploitation framework

67
Q

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:

A

DHCP snooping

68
Q

An endpoint security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats.

A

EDR

69
Q

A software or hardware-based security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network (data exfiltration) is known as:

A

DLP

70
Q

What functionality allows a DLP system to fulfill its role?

A

Content inspection

71
Q

What two things illustrates the difference between passive and active network security breach response?

A

IDS vs. IPS

72
Q

T or F: A dynamic code analysis allows for detecting application flaws without the need for actual execution of the application code.

A

False

73
Q

What refers to an automated or manual code review process aimed at discovering logic and syntax errors in the application’s source code?

A

Static code analysis

74
Q

The practice of finding vulnerabilities in an application by feeding it incorrect input is called:

A

Fuzzing

75
Q

What refers to an embedded cryptoprocessor that can be found on the motherboards of newer PCs and laptops?

A

TPM