Quiz March 5th Flashcards

1
Q

Which penetration-testing concept compromises one system so that it can be used to attack another system?

A

Pivot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to list conditions that might indicate a hacker is attacking a network. Which of the following should you include?

A

A major increase in ICMP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization is using a STIX/TAXII client to review cyber threat indicators provided by an ISAC. What is the MOST likely source of this information?

A

AIS - Automated Indicator Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is vishing?

A

A special type of phishing that uses Voice over IP (VoIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have decided to attach a digital timestamp to a document that is shared on the network. Which attack does this prevent?

A

A replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to explain to personnel a cross-site request forgery (CSRF) attack occurs. Which of the following best describes this attack?

A

When unauthorized commands are executed on a Web server by a trusted user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to educate several members of management regarding the susceptibility of passwords to attacks. To which attacks are passwords susceptible

A

Dictionary, Sniffing, Brute Force, Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user reports that she is unable to access a file server. You discover that there are numerous open connections on the file server from several servers and routers. Which type of attack has affected the file server?

A

Denial-of-service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A member of management recently read an article about an attack that involved the use of multiple computers with purpose of denying legitimate access to a critical server. Which type of attack was being discussed?

A

Distributed denial-of-service (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is tailgating?

A

Following an authorized user through aa restricted entrance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization recently experienced a cross-site scripting (XSS) attack. In which situation does XSS pose the most danger

A

User accesses a financial organization’s site using his or her login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is syslog used?

A

Holds event messages that are valuable for troubleshooting both security and performance issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which research source can help in discovering new vulnerabilities and potential threats in existing Internet standards?

A

RFCs –> Request for Comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of these vulnerabilities could be created by a user who installs a SOHO router?

A

Default Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You need to ensure that resources are only allocated when they are needed. Which secure coding technique should you use?

A

Provisioning and deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your company recently discovered that an attacker carried out an exhaustive password attack. Which type of password attack is often referred to as this?

A

Brute Force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An application that your company developed is susceptible to buffer overflows. Which type of vulnerability is demonstrated by them?

A

Improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Recently, an attacker tricked a user into believing he was selecting a button to direct him to a legitimate web site, but that button actually took him to another site. Which type of attack occurred?

A

Clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following scenarios describes a man-in-the-browser (MitB) attack?

A

When users attempt to access a legitimate website, they are instead redirected to a malicious website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The cafe in the student center of a university established contactless payment by printing QR codes on its menus. One day the menus have new QR codes printed on stickers replaced by old codes. Which social engineering principle made this a successful attack?

A

Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

After troubleshooting an issue on a Windows computer, the IT technician determines that the computer has been infected by a platform-independent virus that was written in an application’s language and is capable of infecting any files using that language. Which virus is present?

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You discover that a malicious program has been installed on several host computers on your network. This program’s execution was remotely triggered. Of what is this an example?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

NA

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You need to protect against database injection attacks. Which of the following should you use?

A

Stored Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

As part of your monthly report, you must classify specific vulnerabilities into a broad range of vulnerability types. Which type of vulnerability is demonstrated by an SQL injection?

A

Improper input handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following best describe the phrase “threat hunting”?

A

Discovering threats that have bypassed your existing security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Management has asked that software developers take the appropriate actions to avoid buffer overflows. What is the BEST method to do so?

A

Execute a well-written program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A hacker has used a design flaw in an application to obtain unauthorized access to the application. Which type of attack has occurred?

A

Escalation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An attack occurred in which an attacker impersonated the identity of another host to gain access to privileged resources that are typically restricted. Which type of attack occurred?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is often the weakest link in the security chain and represents the largest vulnerability?

A

Untrained Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Your organization recently had a cross-site request forgery (CSRF) attack. What is another name for this attack?

A

Session Riding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Why is it important to evaluate your supplier’s security policies when considering risks to the business?

A

The supply chain could be an attack vector to your business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Gaining physical unauthorized access to the data center by using another user’s credentials is an example of which option?

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

As your organization’s security officer, you are currently completing audits to ensure that your security settings meet the established baselines. In which phase of the security management life cycle are you engaged?

A

Operate and Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Management is concerned that applications have been developed using poor programming processes. Which of these issues may result from this?

A

Buffer overflow, Memory leak, Pointer dereference, Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of these options would be included in a scan to identify a common misconfiguration?

A

Router Admin Password

38
Q

You are investigating a point-of-sale (POS) terminal to verify that financial information will be protected. Which one of the following signs indicates a potential skimmer is installed?

A

A bulky casing is installed over the card reader

39
Q

Which internet-based threat intelligence source is hidden from search engines and indexes and is used by privacy advocates and criminals alike?

A

Dark Web

40
Q

Which option includes verifying appropriate access controls, authentication controls, input validation, and proper logging, among others?

A

Identifying a lack of security controls

41
Q

NA

A
42
Q

A hacktivist group claims responsibility for infecting a manufacturer’s systems by planting an infected USB drive at the companies office. Which term describes this attack strategy?

A

Supply Chain

43
Q

In this social engineering principle, the attacker attempts to trick personnel into releasing information by proving that is is fine to release the information based on the actions of others

A

Consensus

44
Q

You have recently been notified by an application vendor that the application includes a rootkit. The manufacturer has released a patch that will remove the vulnerability from the application. What is a rootkit?

A

A collection of programs that grants a hacker administrative access to a computer or network

45
Q

Which of these vulnerabilities is characterized by a user modifying a browser’s security settings to make it more convenient to visit web sites?

A

Misconfiguration/weak configuration

46
Q

Management at your company has recently learned of brute force attacks that were experienced by competitors. They have asked you to make a presentation of these attacks. What is an example of a brute force attack?

A

Using a program to guess passwords from a SAM file

47
Q

You need to ensure that backdoor applications are not installed on any devices in your network. Which tool is NOT a backdoor application?

A

Nessus

48
Q

How does using a syslog server make processing more effecient?

A

A syslog server makes it easier to coordinate events and combine information into a single log

49
Q

An attacker carried out an IP spoofing that included saturating your network with ICMP messages. Which attack occurred?

A

smurf

50
Q

As your organization’s security administrator, you are reviewing the audit results to assess if your organization’s security baselines are maintained. In which phase of the security management life cycle are you engaged?

A

Monitor and Evaluate

51
Q

NA

A
52
Q

A hacker has called a company employee and learned the employee’s user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered?

A

Social Engineering

53
Q

Which types of computers are targeted by RedPill and Scooby Doo attacks?

A

Virtual Machines

54
Q

NA

A
55
Q

You are describing attacks that specifically target virtual machines in cloud-based deployment environments. Which of the following is an example of a virtual machine attack?

A

Hyperjacking

56
Q

You work for a small company that stores password files on an authentication server. To which type of attack are these files vulnerable?

A

A dictionary attack

57
Q

NA

A
58
Q

What is the goal when you passively test security controls?

A

Probing for weaknesses

59
Q

While holding security awareness training for employees, you discuss a security threat that often uses tracking cookies to collect and report on a user’s activities. Which threat are you discussing?

A

Spyware

60
Q

A man wearing a service provider’s coveralls and carrying a toolbox approaches your facilities security guard. He says that his work crew is running some new Ethernet cable inside your office, but he left his mobile phone at home, so he can’t call his crew to let him in. Which social engineering attack techniques were used?

A

Pretexting, Impersonation

61
Q

You have just been hired as the systems administrator for a research and development firm. Your organization allows the employees to use social media at work. What particular concern should you voice to management?

A

Data Exfiltration

62
Q

Which SIEM feature would be best for long-term storage and security?

A

Logs/WORM

63
Q

Which threat actor type would most likely have the most resources available?

A

Nation States

64
Q

Which of the following is the best description of a zero-day exploit?

A

An attack that exploits a security vulnerability on the day the vulnerability becomes generally known

65
Q

Your company contracts with a third-party janitorial service to clean the offices every night. Which one of these policies presents the greatest risk to the organization if it is NOT implemented?

A

Clean Desk Policy

66
Q

Which team is responsible for taking on the role of an attacker during the simulation of a security incident?

A

Red Team

67
Q

You are describing how multiple techniques can be applied in a single attack. Which type of attack combines IP spoofing with the act if inserting malicious code in packets?

A

Man-in-the-middle

68
Q

NA

A
69
Q

You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war driving. You need to protect against this type of attack. What should you do?

A

Configure the network to use WPA or WPA2, Change the default Service Set Identifier (SSID), Configure the network to use authenticated access only, Disable SSID broadcast

70
Q

Management is worried about an evil twin. Which of the following BEST describes this entity?

A

An access point with the same SSID as the legitimate access point

71
Q

You need to ensure that your companies anti-virus application protects against viruses that include protective code that prevents outside examination of critical elements. Which type of virus is this?

A

Armored Virus

72
Q

NA

A
73
Q

Your organization recently experienced an XSS attack. What is the best protection against this type of attack?

A

Disable the running of scripts

74
Q

Which type of test relies heavily on automated scanning tools and reporting?

A

Vulnerability Test

75
Q

Which threat actor type can be characterized by having an unsophisticated skill level, using widely available tools, and being often motivated by the need that they can prove that they can do it?

A

Script Kiddies

76
Q

As part of your companies comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your companies subnetworks. Which statement is true of this scan?

A

It impacts the hosts and network less than other scan types

77
Q

Which type of attack relies on mistakes made by users when they input Web addresses

A

URL Highjacking

78
Q

NA

A
79
Q

Which team is responsible for debriefing both attackers and defenders after an attack simulation?

A

Purple Team

80
Q

You are exploring the attack surface of a Windows 10 host. Which scripting environment is an automation standard for modern Windows systems?

A

PowerShell

81
Q

You are exploring the attack surface of a Linux host. Which scripting environment is an automation standard for most Linux/Unix systems?

A

Bash

82
Q

Which type of state-sponsored attack targets another states critical vulnerabilities in cyberspace, so as to weaken that state’s governance or sow dissent throughout its populace

A

Hybrid Warfare

83
Q

Your company underwent an attack that involved an attacker injecting a command to access the underlying file system. Which type of attack occurred

A

Directory Traversal

84
Q

Microsoft releases a notification to all users that a vulnerability has been recently discovered in SQL. Server 2017 (version 14.0) that could allow an attacker to control your computer remotely. They are working on a fix, but do not have a workaround available. Which term best describes this risk?

A

Zero-day Vulnerability

85
Q

A use notifies you that a software application displays advertisements while the application is executing. Of which security threat is this an example?

A

Adware

86
Q

Your organization uses several applications that are considered to be multithreaded. Which memory vulnerability is associated with these application?

A

Race Condition

87
Q

Your company has recently implemented a content inspection application on a perimeter firewall. What is the purpose of content inspection?

A

To search for malicious code or behavior

88
Q

Your organization has asked the security team to add terrorist attacks to the organization’s business continuity plan. Which type of threat does this most likely represent?

A

Politically motivated threat

89
Q

NA

A
90
Q

Which type of threat involves a highly skilled group of attackers that keep their presence hidden, so that they can continually exploit their targets?

A

APT