Quiz #4 Flashcards
What two files are commonly attacked using offline brute-force attacks?
a. The Windows SAM and the Linux /etc/passwd file
b. The Windows registry and the Linux /etc/passwd file
c. The Windows registry and the Linux /etc/shadow file
d. The Windows SAM and the Linux /etc/shadow file
d. The Windows SAM and the Linux /etc/shadow file
What two techniques are most commonly associated with a pharming attack?
a. Modifying the hosts file on a PC or exploiting a DNS vulnerability on a trusted DNS server
b. Phishing many users and harvesting email addresses from them
c. Phishing many users and harvesting many passwords from them
d. Spoofing DNS server IP addresses or modifying the hosts file on a PC
a. Modifying the hosts file on a PC or exploiting a DNS vulnerability on a trusted DNS server
Jared has discovered malware on the workstations of several users. This particular malware provides administrative privileges for the workstation to an external hacker. What best describes this malware?
a. Trojan horse
b. Logic bomb
c. Rootkit
d. Multipartite virus
c. Rootkit
Carolyn runs a vulnerability scan of a network device and discovers that the device is running services on TCP ports 22 and 443. What services has she most likely discovered?
a. Telnet and a web server
b. SSH and a web server
c. FTP and a Windows fileshare
d. SSH and a Windows fileshare
b. SSH and a web server
Greg wants to gain admission to a network which is protected by a network access control (NAC) system that recognized the hardware address of systems. How can he bypass this protection?
a. Conduct a denial-of-service attack against the NAC system
b. Spoof a legitimate IP address
c. Use MAC cloning to clone a legitimate MAC address.
d. None of the above
c. Use MAC cloning to clone a legitimate MAC address.
Daryl is investigating a recent breach of his company’s web server. The attacker used sophisticated techniques and then defaced the website, leaving messages that were denouncing the company’s public policies. He and his team are trying to determine the type of actor who most likely committed the breach. Based on the information provided, who was the most likely threat actor?
a. A script
b. Organized crime
c. Nation-state
d. Hacktivists
d. Hacktivists
Susan’s secure building is equipped with alarms that go off if specific doors are opened. As part of a penetration test, Susan wants to determine if the alarms are effective. What technique is used by penetration testers to make alarms less effective?
a. Setting off the alarms as part of a preannounced test
b. Setting off the alarms repeatedly so that staff become used to hearing them go off
c. Disabling the alarms and then opening doors to see if staff report the opened doors
d. Asking staff members to open the doors to see if they will set the alarm off
b. Setting off the alarms repeatedly so that staff become used to hearing them go off
In an attempt to observe hacker techniques, a security administrator configures a nonproduction network to be used as a target so that he can covertly monitor network attacks. What is this type of network called?
a. Honeynet
b. Active detection
c. False subnet
d. IDS
a. Honeynet
Nora has rented a building with access to bandwidth and power in case her organization ever experiences a disaster. What type of site has she established?
a. A cold site
b. A hot site
c. A warm site
d. A MOU site
a. A cold site
Which cloud service model provides the consumer with the infrastructure to create applications and host them?
a. SaaS
b. PaaS
c. IaaS
d. IDaaS
b. PaaS
Mike knows that computational overheads are a concern for cryptographic systems. What can he do to help limit the computational needs of his solution?
a. Use hashes instead
b. Use short keys
c. Use elliptic curve encryption
d. Use the RSA algorithm
c. Use elliptic curve encryption
Angela wants to help her organization use APIs more securely and needs to select three API security best practices. Which of the following options is not a common API security best practice?
a. Use encryption throughout the API’s request/response cycle
b. Enable auditing and logging
c. Do not trust input strings and validate parameters
d. Authorize before authenticating.
d. Authorize before authenticating.
What does the OPAL standard specify?
a. Online personal access licenses
b. The origin of personal accounts and libraries
c. Self-encrypting drives
d. Drive sanitization modes for degaussers
c. Self-encrypting drives
Cynthia wants to issue contactless cards to provide access to the buildings she is tasked with securing. Which of the following technologies should she deploy?
a. RFID
b. Wi-Fi
c. Magstripe
d. HOTP
a. RFID
Which of the following is not a common way to validate control over a domain for a domain-validated X.509 certificate?
a. Changing the DNS TXT record
b. Changing the IP addresses associated with the domain
c. Responding to an email sent to a contact in the domain’s WHOIS information
d. Publishing a nonce provided by the certificate authority as part of the domain information
b. Changing the IP addresses associated with the domain