Practice Test 4 Flashcards
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)
IPsec MPLS PAP Kerberos CHAP
IPsec
Kerberos
CHAP
A REPLAY ATTACK is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution.
Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services.
KERBEROS is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology.
Challenge Handshake Authentication Protocol (CHAP) is a process of authenticating a user to a network entity, which may be any server, e.g., the web or internet service provider (ISP). CHAP is primarily used for security purposes.
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
AES
DES
RC4
3DES
AES
The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption.
Which of the following cryptographic hash functions is the least vulnerable to attacks?
SHA-1
RIPEMD
SHA-512
MD5
SHA-512
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standard, known as SHA-224, SHA-384, SHA-512/224 and SHA-512/256. These were also designed by the NSA.
Which statements best describe the attributes of a script kiddie? (Select 2 answers)
Motivated by money.
Low level of technical sophistication.
Motivated by ideology.
High level of technical sophistication.
Lack of extensive resources/funding.
Low level of technical sophistication.
Lack of extensive resources/funding.
A person who breaks into a computer network or system for a politically or socially motivated purpose is typically described as:
Insider
Competitor
Hacktivist
Script kiddie
Hacktivist
Which of the following terms best describes a threat actor type whose sole intent behind breaking into a computer system or network is monetary gain?
Hacktivist
Script kiddie
Organized crime
Competition
Organized crime
Which statements best describe the attributes of an APT? (Select 3 answers)
Lack of extensive resources/funding.
High level of technical sophistication.
Extensive amount of resources/funding.
Threat actors are individuals.
Low level of technical sophistication.
Threat actors are governments/nation states.
High level of technical sophistication.
Extensive amount of resources/funding.
Threat actors are governments/nation states.
An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. … Some APTs are so complex that they require full-time administrators to maintain the compromised systems and software in the targeted network.
Which term best describes a disgruntled employee abusing legitimate access to company’s internal resources?
Script kiddie
Insider threat
Hacktivist
Organized crime
Insider threat
Which of the following terms best describes a type of threat actor that engages in illegal activities to get the know-how and gain market advantage?
Insiders
Nation states/APT
Organized crime
Competitors
Competitors
Which of the statements listed below describe the purpose behind collecting OSINT? (Select 3 answers)
Gaining advantage over competitors.
Passive reconnaissance in penetration testing.
Application whitelisting/blacklisting
Preparation before launching a cyberattack.
Disabling unnecessary ports and services.
Active reconnaissance in penetration testing.
Gaining advantage over competitors.
Passive reconnaissance in penetration testing.
Preparation before launching a cyberattack.
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources).
In penetration testing, active reconnaissance involves gathering any type of publicly available information that can be used later for exploiting vulnerabilities found in the targeted system.
True
False
False
In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.
True
False
False
In penetration testing, the practice of using one compromised system as a platform for further attacks on other systems on the same network is known as:
Initial exploitation
Pivoting
Escalation of privilege
Gray-box testing
Pivoting
Penetration test of a computer system without the prior knowledge on how the system that is to be tested works is commonly referred to as black-box testing.
True
False
True
Penetration test performed by an authorized professional with the full prior knowledge on how the system that is to be tested works is called:
Black-hat hacking
White-box testing
Black-box testing
White-hat hacking
White-box testing