Practice Test 4 Flashcards

1
Q

Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)

IPsec
MPLS
PAP
Kerberos 
CHAP
A

IPsec
Kerberos
CHAP

A REPLAY ATTACK is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution.

Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services.

KERBEROS is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology.

Challenge Handshake Authentication Protocol (CHAP) is a process of authenticating a user to a network entity, which may be any server, e.g., the web or internet service provider (ISP). CHAP is primarily used for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

AES
DES
RC4
3DES

A

AES

The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following cryptographic hash functions is the least vulnerable to attacks?

SHA-1
RIPEMD
SHA-512
MD5

A

SHA-512

SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as SHA-224, SHA-384, SHA-512/224 and SHA-512/256. These were also designed by the NSA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statements best describe the attributes of a script kiddie? (Select 2 answers)

Motivated by money.
Low level of technical sophistication.
Motivated by ideology.
High level of technical sophistication.
Lack of extensive resources/funding.

A

Low level of technical sophistication.

Lack of extensive resources/funding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A person who breaks into a computer network or system for a politically or socially motivated purpose is typically described as:

Insider
Competitor
Hacktivist
Script kiddie

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following terms best describes a threat actor type whose sole intent behind breaking into a computer system or network is monetary gain?

Hacktivist
Script kiddie
Organized crime
Competition

A

Organized crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which statements best describe the attributes of an APT? (Select 3 answers)

Lack of extensive resources/funding.
High level of technical sophistication.
Extensive amount of resources/funding.
Threat actors are individuals.
Low level of technical sophistication.
Threat actors are governments/nation states.

A

High level of technical sophistication.

Extensive amount of resources/funding.

Threat actors are governments/nation states.

An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. … Some APTs are so complex that they require full-time administrators to maintain the compromised systems and software in the targeted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which term best describes a disgruntled employee abusing legitimate access to company’s internal resources?

Script kiddie
Insider threat
Hacktivist
Organized crime

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms best describes a type of threat actor that engages in illegal activities to get the know-how and gain market advantage?

Insiders
Nation states/APT
Organized crime
Competitors

A

Competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the statements listed below describe the purpose behind collecting OSINT? (Select 3 answers)

Gaining advantage over competitors.
Passive reconnaissance in penetration testing.
Application whitelisting/blacklisting
Preparation before launching a cyberattack.
Disabling unnecessary ports and services.
Active reconnaissance in penetration testing.

A

Gaining advantage over competitors.

Passive reconnaissance in penetration testing.

Preparation before launching a cyberattack.

Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In penetration testing, the practice of using one compromised system as a platform for further attacks on other systems on the same network is known as:

Initial exploitation
Pivoting
Escalation of privilege
Gray-box testing

A

Pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Penetration test of a computer system without the prior knowledge on how the system that is to be tested works is commonly referred to as black-box testing.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works is called:

Black-hat hacking
White-box testing
Black-box testing
White-hat hacking

A

White-box testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following terms is used to describe a type of penetration test in which the person conducting the test has a limited access to information on the internal workings of the targeted system?

Black-box testing
Fuzz testing
Gray-box testing
White-box testing

A

Gray-box testing

17
Q

Penetration testing: (Select all that apply)

Bypasses security controls.
Only identifies lack of security controls.
Actively tests security controls.
Exploits vulnerabilities.
Passively tests security controls.
A

Bypasses security controls.

Actively tests security controls.

Exploits vulnerabilities.

18
Q

Vulnerability scanning: (Select all that apply)

Identifies lack of security controls.
Actively tests security controls.
Identifies common misconfigurations.
Exploits vulnerabilities.
Passively tests security controls.
A

Identifies lack of security controls.

Identifies common misconfigurations.

Passively tests security controls.

19
Q

A malfunction in pre-programmed sequential access to a shared resource is described as:

Race condition
Buffer overflow
Memory leak
Pointer de-reference

A

Race condition

20
Q

Which of the terms listed below refers to a software that no longer receives continuing support?

OEM
SDLC
EOL
SPoF

A

EOL

“End-of-life” (EOL)

21
Q

Which of the following factors pose the greatest risk for embedded systems? (Select 2 answers)

Lack of user training.
Inadequate vendor support.
System sprawl.
Default configurations.
Improper input handling.
A

Inadequate vendor support.

Default configurations

22
Q

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:

Zero-day vulnerability
Improper input validation
Default configuration
Improper error handling

A

Improper input validation

23
Q

After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:

Fuzz testing
Improper input handling
Brute-force attack
Improper error handling

A

Improper error handling

24
Q

A predefined username/password on a brand new wireless router is an example of:

Default configuration
Misconfiguration
Zero-day vulnerability
Architecture/design weakness

A

Default configuration

25
Q

Which of the answers listed below describes the result of a successful DoS attack?

Code injection
Resource exhaustion
Identity theft
Privilege escalation

A

Resource exhaustion