Practice Test SYO - 701 Threats, Vulnerabilities and Mitigations Flashcards
Ahmed is a sales manager with a major insurance company. He has received an email that is encouraging him to click on a link and fill out a survey. He is suspicious of the email, but it does mention a major insurance association, and that makes him think it might be legitimate. What best describes this attack?
C. Spear phishing is targeted to a specific group, in this case insurance professionals. Although this is a form of phishing, the more specific answer is the one you will need to choose on questions like this. Phishing uses social engineering techniques to succeed but is once again a broader answer than spear phishing and thus is not the correct choice.
The company that Yarif works for uses a third‐party IT support company to manage their cloud‐hosted web application infrastructure. How can Yarif best address concerns about potential threat vectors via the managed service provider (MSP)?
Conduct regular vulnerability scans.
Use shared incident response exercises to prepare.
Ensure appropriate contractual coverage for issues.
Require the MSP to have an annual pentest.
C. Using appropriate contractual terms is usually the best available option for handling third‐party vendor risk. The terms can include things like security practices, such as pentesting, incident response exercises, and vulnerability scanning, and can also have sufficient penalties to ensure ongoing compliance from responsible companies.
Helen is concerned about ransomware attacks against workstations that she is responsible for. Which of the following hardening options is best suited to protecting her organization from ransomware?
Installing host‐based firewalls
Installing endpoint protection software
Installing a host‐based IPS software
Removing unnecessary software
B. Endpoint protection software like an endpoint detection and response (EDR) or extended detection and response (XDR) tool will provide the greatest protection against ransomware. Firewalls and intrusion prevention systems (IPSs) are less likely to prevent ransomware from being installed, and removing unnecessary software may reduce the attack surface but most ransomware is installed via attacks that leverage users.
Julie wants to conduct a replay attack. What type of attack is most commonly associated with successful replay attacks?
SQL injection
An on‐path attack
Brute force
A DDoS
B. On‐path attacks that route traffic through a system or device that the attacker controls allow the attacker to both receive and modify traffic, making replay attacks more likely to succeed. SQL injection attacks are associated with web applications and databases. Brute‐force and distributed denial‐of‐service (DDoS) attacks are not typically associated with replay attacks.
What is the primary concern for security professionals about legacy hardware?
Its likelihood of failure
Lack of patches and updates
Lack of vendor support
Inability to support modern protocols
B. The primary concern for security professionals around legacy hardware is their lack of patches and updates, meaning that security fixes and updates will not exist. While the hardware could fail, that would typically lead to replacement with more modern, supportable options and is a concern for the system administrators and owners. Lack of vendor support and inability to support modern protocols are primarily concerns for owners and system administrators.
Coleen is the web security administrator for an online auction website. A small number of users are complaining that when they visit the website it does not appear to be the correct site. Coleen checks and she can visit the site without any problem, even from computers outside the network. She also checks the web server log and there is no record of those users ever connecting. Which of the following might best explain this?
Typo squatting
SQL injection
Cross‐site scripting
Cross‐site request forgery
A. From the description it appears that they are not connecting to the real web server but rather a fake server. That indicates typo squatting: having a URL that is named very similarly to a real site so that when users mistype the real site’s URL they will go to the fake site.
Alice wants to prevent server‐side request forgery (SSRF) attacks. Which of the following will not be helpful for preventing them?
Removing all SQL code from submitted HTTP queries
Blocking hostnames like 127.0.01 and localhost
Blocking sensitive URLs like /admin
Applying allow list–based input filters
A. Server‐side request forgery (SSRF) attempts typically attempt to get HTTP data passed through and will not include SQL injection. Blocking sensitive hostnames, IP addresses, and URLs are all valid ways to prevent SSRF, as is the use of allow list–based input filters.
Mahmoud is responsible for managing security at a large university. He has just performed a threat analysis for the network, and based on past incidents and studies of similar networks, he has determined that the most prevalent threat to his network are attackers who wish to breach the system, simply to prove they can or for some low‐level crime, such as changing a grade. Which term best describes this type of attacker?
Hacktivist
Nation‐state
Insider
Unskilled attacker
D. Unskilled attackers, often called script kiddies, tend to use premade tools in unsophisticated ways. Hacktivists take action based on political motivation, insiders operate from inside of an organization, and nation‐state actors are typically highly capable and well resourced.
Frank is a network administrator for a small college. He discovers that several machines on his network are infected with malware. That malware is sending a flood of packets to a target external to the network. What best describes this attack?
SYN flood
DDoS
Botnet
Backdoor
B. His machines are part of a distributed denial‐of‐service (DDoS) attack. This scenario describes a generic DDoS, not a specific one like SYN flood, which would involve many SYN packets being sent without a full three‐way TCP handshake. These machines could be part of a botnet or they may just have a trigger that causes them to launch the attack at a specific time. The real key in this scenario is the DDoS attack. Finally, a backdoor gives an attacker access to the target system.
Dennis uses an on‐path attack to cause a system to send traffic to his system and then forwards it to the actual server the traffic is intended for. What information will be visible from his system as it passed through it?
All traffic meant for remote systems
All traffic meant for local systems
Only unencrypted traffic
Only unencrypted traffic meant for his system
A. An on‐path attack redirects all traffic through an attacker’s system that would normally pass through a network gateway. Dennis will be able to see all traffic bound for remote systems, but some of it may be encrypted.
Jake’s vulnerability scanner reports that the software his organization is running is vulnerable to a cryptographic downgrade attack. What concern should Jake have about this potential issue?
Attackers may be able to force use of a weaker encryption algorithm, making data easier to access.
Attackers may be able to force use of weaker hashing, making it easier to recover passwords.
Attackers may be able to force use of older versions of the software, including previously patched vulnerabilities.
Attackers may be able to force encryption to be turned off, causing information to be sent in plain text.
A. Cryptographic downgrade attacks like POODLE, FREAK, and Logjam all rely on flaws that cause software to use weaker encryption options. This could allow attackers to capture traffic encrypted with weaker encryption, potentially allowing them to decrypt the traffic and read it. They do not allow hashing changes to recover passwords, reversion to old versions of software, or encryption to be entirely turned off.
Rick has three major categories of data and applications in use in his virtualization environment: highly sensitive; business sensitive; and unclassified, or public information. He wants to ensure that data and applications of different sensitivity are not compromised in the event of a breach. What mitigation technique is best suited to this type of requirement?
Application allow lists
Monitoring
Least privilege
Segmentation
D. Segmentation can be used to separate systems and applications of different sensitivity levels. A breach of one segmented group should not automatically mean that the other groupings are in immediate danger. Application allow lists control what applications can be installed but do not introduce separation between systems and applications. Monitoring would allow visibility but does not meet the goal Rick has. Least privilege is an effective practice to ensure only the rights required are in place, but again this does not meet the goal.
Naomi is preparing a laptop for a traveling salesperson who frequently needs to connect to untrusted hotel networks. What hardening technique can she use to provide the greatest protection against network‐based attacks on untrusted networks?
Install an endpoint detection and response tool.
Install a host‐based firewall.
Install an extended detection and response tool.
Install a disk encryption tool.
B. A host‐based firewall is an excellent first line of defense for systems that will be deployed to untrusted networks. EDR and XDR are useful for preventing malicious software installs like ransomware, but they do not directly protect against network‐based attacks, and disk encryption is a confidentiality control, not a useful tool to prevent network‐based attacks.
While conducting a vulnerability scan of her network, Susan discovers that a marketing staff member has set up their own server running a specialized marketing tool. After inquiring about the server, which is vulnerable due to missing patches, Susan discovers that the team set it up themselves because of a need that was not met by existing tools. What type of threat actor has Susan encountered?
An unskilled attacker
An insider threat
Shadow IT
A hacktivist
C. The marketing team has created a shadow IT solution—a solution put in place without central or formal IT support, typically done without IT’s assistance or awareness. This creates a risk to the organization due to lack of support and may bring additional risks like licensing and compliance risks. The team did not intend to create an issue and is not actively working against the organization, meaning that they are not unskilled attackers, insider threats, or hacktivists.
Henry wants to decommission a server that was used to store sensitive data. What step should he take to ensure the decommissioning process protects the organization’s data?
Reformat the drives as part of the decommissioning process.
Physically destroy the drives as part of the decommissioning process.
Remove the system from organizational inventory as part of the decommissioning process.
Physically destroy the entire system as part of the decommissioning process.
B. Since the drives stored sensitive data and no mention of encryption was made, the drives should be physically destroyed to ensure that no data leakage can occur. It is not necessary to destroy the entire system to ensure this. Reformatting drives does not wipe data, and simply removing the system from inventory is typically part of the process but does not protect organizational data.
Paul has performed an nmap scan of a new network connected device. He notices TCP ports 22, 80, and 443 are open. If his hardening guidelines only allow encrypted management interfaces, what port or ports should he disable from this list?
22
80
22 and 80
80 and 443
B. Paul knows that SSH typically uses port 22, HTTP uses port 80, and HTTPS uses port 443. HTTP is the only unencrypted protocol from that list, and thus he should disable port 80.
Which of the following protocols is most commonly associated with credential relaying attacks?
RDP
NTLM
SQL
TLS
B. While dated, NTLM was historically one of the most common targets of credential relay attacks. RDP, SQL, and TLS are less commonly associated with credential relay attacks. Modern protocols implement encryption, session, IDs, and one‐time passwords to prevent this type of attack.
Derek wants to conduct a birthday attack against a digital signature. Which of the following best describes the process he would need to take to achieve his goal?
He needs to prepare both a correct and a malicious document and find ways to modify the correct document until its encryption matches the malicious document.
He needs to make sure all dates match in both a correct and a malicious document.
He needs to ensure that the file length and creation date match for both a correct document and a malicious document.
He needs to prepare both a correct and a malicious document, then find ways to modify the malicious document until its hash matches the hash of the correct document.
D. Derek knows that attacking a digital signature requires that hashes match for both an original document and a malicious document. He will modify the malicious document until he finds a way to convey the changes he needs while retaining the matching hash. This type of attack is why hashing algorithms needs to be resistant to birthday attacks.
Ashley’s organization has recently come under attack and has suffered a DNS outage. As she investigated, she found that requests to her DNS servers were sent to open DNS resolvers using spoofed IP addresses with requests that would result in very large responses from the DNS resolvers to the IP addresses that appeared to be making the request. What type of attack targeted Ashley’s organization?
A reflected DDoS
A DNS flood
A mirrored DDoS
A supersized query attack
A. Ashley’s organization was the target of a reflected (and amplified) DDoS where attackers took advantage of DNS queries to make small amounts of spoofed traffic into very large amounts of data sent to her servers. DNS floods, mirrored DDoSs, and supersized query attacks were made up for this question.
Kara wants to protect against the most common means of firmware‐based exploits. Which of the following is not a common firmware defense mechanism for the vendors of devices that use firmware?
Using signed firmware updates
Using input validation for user input
Encrypting firmware
Code review processes for firmware
C. Firmware is typically not encrypted, but it is commonly digitally signed. Using input validation and code review both help to keep firmware secure.
Annie’s organization has been facing negative social media campaigns for months and is struggling to address them. Numerous bot posts about the company are providing incorrect information about the company. What type of attack is Annie’s company facing?
A misinformation campaign
A pretexting campaign
An impersonation campaign
A disinformation campaign
D. Annie’s company is facing a disinformation campaign. If users were simply getting facts wrong, this would be misinformation, but since bots are intentionally misstating information, it is disinformation. Pretexting would attempt to exploit human behaviors to explain why something needed to occur or why an attacker was asking for something. Impersonation occurs when an attacker pretends to be someone they are not.
What threat vector is most impacted by how Windows handles autorun.inf files?
Removable devices
Open service ports
Unsecure Wi‐Fi
Watering hole attacks
A. Removable devices like USB thumb drives, digital picture frames, and even keyboards and mice with onboard storage rely on autorun.inf files to automatically run software they provide. While that functionality typically focuses on printing, opening folders, or running media players, it can also be leveraged to automatically run malware. For this reason, many organizations ban removable drives or prohibit autorun from working. Open service ports are commonly associated with applications and services, and autorun doesn’t set up or run these, nor does it impact Wi‐Fi. Watering hole attacks require attackers to compromise or gain access to a site that targets commonly visit so that they deliver malware to their targets.
Raj wants to reduce the attack surface for a newly purchased laptop. What hardening technique will help him reduce the possibility of remote exploits while also decreasing the amount of ongoing patch management he needs to do for the system?
Encrypt the system’s boot drive.
Install EDR software.
Remove unnecessary software.
Change any default passwords.
C. Raj knows that removing unnecessary software reduces a system’s attack surface and also means that he won’t have to patch and maintain the software he removes. Encrypting a drive, installing EDR, and changing default passwords won’t reduce patch management, but EDR and changing default passwords could help with remote exploit prevention.
Mary has discovered that a web application used by her company does not always handle multithreading properly, particularly when multiple threads access the same variable. This could allow an attacker who discovered this vulnerability to exploit it and crash the server. What type of error has Mary discovered?
Buffer overflow
Logic bomb
Race conditions
Improper error handling
C. A race condition can occur when multiple threads in an application are using the same variable and the situation is not properly handled. A buffer overflow is attempting to put more data in a buffer than it is designed to hold. A logic bomb is malware that performs its misdeed when some logical condition is met. As the name suggests, improper error handling is the lack of adequate or appropriate error handling mechanisms within software.