other FT questions Flashcards

1
Q

What is used in URL Phishing?

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A situation where a cryptographic hash function produces two different digests for the same data input is referred to as a hash collision.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’; is an example of what type of attack?

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.

A

DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A situation in which an application writes to an area of memory it is not supposed to have access to.

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malfunction in a preprogrammed sequential access to a shared resource.

A

Race Condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions.

A

SSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works.

A

White-box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: In cybersecurity exercises, purple team combines the roles of all other teams (i.e. red, blue, and white).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What state of digital data requires data to be processed in an unencrypted form?

A

In processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data.

A

Hot site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A disaster recovery facility that provides only the physical space for recovery operations.

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software

A

IaaS (Infrastructure as a Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems.

A

RTOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An integrated circuit combining components normally found in a standard computer system.

A

SoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T or F: One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks.

A

Salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The best solution for a company that needs IT services but lacks any IT personnel?

A

MSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A third-party vendor offering IT security management services?

A

MSSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T or F: The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The concept of virtualization on an application level.

A

Containerization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Usage audit and Asset documentation are security measures can be used to prevent:
VM Sprawl
26
T or F: Code obfuscation techniques rely on encryption to protect the source code against unauthorized access.
False
27
A collection of commonly used programming functions designed to speed up software development process is known as:
Library
28
Refers to a specialized suite of software tools used for developing applications for a specific platform.
SDK
29
A nonprofit organization focused on software security.
OWASP
30
A security feature used in Bluetooth device pairing.
PIN code
31
Software that enables a centralized administration of mobile devices.
MDM
32
T or F: The term "Push notification" is used to describe information delivery from a server to a client performed without a specific request from the client.
True.
33
In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:
Containerization
34
A mobile security solution that enables separate controls over the user and enterprise data is called:
Storage segmentation
35
A software tool that provides a single management interface for mobile devices, PCs, printers, IoT devices and wearables.
UEM
36
The term "Rooting" refers to the capability of gaining administrative access to the operating system and system applications on:
Android devices
37
A monitoring port on a network device is referred to as:
Tap
38
Wireless security protocol that has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws.
WEP
39
Encryption scheme is used in WiFi Protected Access 2 (WPA2)
AEP-CCMP
40
A client authentication method used in WPA2 Personal mode.
PSK
41
A client authentication method used in WPA3 Personal mode.
SAE
42
EAP method that offers the highest level of security.
EAP-TLS
43
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as:
WPS
44
What wireless technologies are deprecated and should not be used due to their known vulnerabilities?
WPS and WEP
45
A common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments.
Omnidirectional antenna
46
SSL stripping is an example of:
Brute Force and Downgrade attack.
47
A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:
Pass the hash.
48
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
RFID
49
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?
ARP poisoning
50
An account policy setting that forces users to come up with a new password every time they are required to change their old password is called
Password history
51
During a password reminder procedure the system asks security question that covers personal details that should be known only to the user (e.g. user's favorite holiday destination). This type of authentication method is an example of:
KBA
52
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:
SSO
53
OpenID Connect is a protocol used for:
Authentication
54
OAuth is an open standard for:
Authorization
55
T or F: A common implementation of identity and access controls used in federated SSO systems includes OpenID Connect and Oauth 2.0 used in conjunction to provide authentication and authorization services.
True
56
What protocol ensures the reliability of the Kerberos authentication process?
NTP
57
A Linux command that allows to display the beginning of a file (by default its first 10 lines) is known as:
head
58
A Linux command that allows to create, view, and concatenate files is called:
cat
59
A Linux command-line command that enables searching files for lines containing a match to a given text pattern is called:
grep
60
A software library used to implement encrypted connections?
OpenSSL
61
A Command-Line Interface (CLI) packet-crafting tool?
Tcpreplay
62
A Command-Line Interface (CLI) packet-capturing tool used in Unix-like operating systems.
tcpdump
63
A Linux command-line utility that can be used in the forensic process for creating and copying image files is called:
dd
64
A multi-function disk and binary data editor used for low-level data processing, data recovery, and digital forensics.
WinHex
65
An open-source forensics platform that allows to examine the contents of a hard drive or mobile device and recover evidence from it.
Autopsy
66
What is Metasploit?
Exploitation framework
67
A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:
DHCP snooping
68
An endpoint security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats.
EDR
69
A software or hardware-based security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network (data exfiltration) is known as:
DLP
70
What functionality allows a DLP system to fulfill its role?
Content inspection
71
What two things illustrates the difference between passive and active network security breach response?
IDS vs. IPS
72
T or F: A dynamic code analysis allows for detecting application flaws without the need for actual execution of the application code.
False
73
What refers to an automated or manual code review process aimed at discovering logic and syntax errors in the application's source code?
Static code analysis
74
The practice of finding vulnerabilities in an application by feeding it incorrect input is called:
Fuzzing
75
What refers to an embedded cryptoprocessor that can be found on the motherboards of newer PCs and laptops?
TPM