Quiz March 5th Flashcards
Which penetration-testing concept compromises one system so that it can be used to attack another system?
Pivot
You need to list conditions that might indicate a hacker is attacking a network. Which of the following should you include?
A major increase in ICMP traffic
Your organization is using a STIX/TAXII client to review cyber threat indicators provided by an ISAC. What is the MOST likely source of this information?
AIS - Automated Indicator Sharing
NA
What is vishing?
A special type of phishing that uses Voice over IP (VoIP)
You have decided to attach a digital timestamp to a document that is shared on the network. Which attack does this prevent?
A replay attack
You need to explain to personnel a cross-site request forgery (CSRF) attack occurs. Which of the following best describes this attack?
When unauthorized commands are executed on a Web server by a trusted user
You need to educate several members of management regarding the susceptibility of passwords to attacks. To which attacks are passwords susceptible
Dictionary, Sniffing, Brute Force, Social Engineering
A user reports that she is unable to access a file server. You discover that there are numerous open connections on the file server from several servers and routers. Which type of attack has affected the file server?
Denial-of-service (DoS) attack
A member of management recently read an article about an attack that involved the use of multiple computers with purpose of denying legitimate access to a critical server. Which type of attack was being discussed?
Distributed denial-of-service (DDoS) attack
What is tailgating?
Following an authorized user through aa restricted entrance
Your organization recently experienced a cross-site scripting (XSS) attack. In which situation does XSS pose the most danger
User accesses a financial organization’s site using his or her login credentials
How is syslog used?
Holds event messages that are valuable for troubleshooting both security and performance issues
Which research source can help in discovering new vulnerabilities and potential threats in existing Internet standards?
RFCs –> Request for Comments
Which of these vulnerabilities could be created by a user who installs a SOHO router?
Default Configuration
You need to ensure that resources are only allocated when they are needed. Which secure coding technique should you use?
Provisioning and deprovisioning
Your company recently discovered that an attacker carried out an exhaustive password attack. Which type of password attack is often referred to as this?
Brute Force attack
An application that your company developed is susceptible to buffer overflows. Which type of vulnerability is demonstrated by them?
Improper input handling
Recently, an attacker tricked a user into believing he was selecting a button to direct him to a legitimate web site, but that button actually took him to another site. Which type of attack occurred?
Clickjacking
Which of the following scenarios describes a man-in-the-browser (MitB) attack?
When users attempt to access a legitimate website, they are instead redirected to a malicious website
The cafe in the student center of a university established contactless payment by printing QR codes on its menus. One day the menus have new QR codes printed on stickers replaced by old codes. Which social engineering principle made this a successful attack?
Trust
After troubleshooting an issue on a Windows computer, the IT technician determines that the computer has been infected by a platform-independent virus that was written in an application’s language and is capable of infecting any files using that language. Which virus is present?
Macro Virus
You discover that a malicious program has been installed on several host computers on your network. This program’s execution was remotely triggered. Of what is this an example?
Botnet
NA
You need to protect against database injection attacks. Which of the following should you use?
Stored Procedures
As part of your monthly report, you must classify specific vulnerabilities into a broad range of vulnerability types. Which type of vulnerability is demonstrated by an SQL injection?
Improper input handling
Which of the following best describe the phrase “threat hunting”?
Discovering threats that have bypassed your existing security mechanisms
Management has asked that software developers take the appropriate actions to avoid buffer overflows. What is the BEST method to do so?
Execute a well-written program
A hacker has used a design flaw in an application to obtain unauthorized access to the application. Which type of attack has occurred?
Escalation of privileges
An attack occurred in which an attacker impersonated the identity of another host to gain access to privileged resources that are typically restricted. Which type of attack occurred?
Spoofing
What is often the weakest link in the security chain and represents the largest vulnerability?
Untrained Users
Your organization recently had a cross-site request forgery (CSRF) attack. What is another name for this attack?
Session Riding
Why is it important to evaluate your supplier’s security policies when considering risks to the business?
The supply chain could be an attack vector to your business
Gaining physical unauthorized access to the data center by using another user’s credentials is an example of which option?
Piggybacking
As your organization’s security officer, you are currently completing audits to ensure that your security settings meet the established baselines. In which phase of the security management life cycle are you engaged?
Operate and Maintenance
Management is concerned that applications have been developed using poor programming processes. Which of these issues may result from this?
Buffer overflow, Memory leak, Pointer dereference, Integer overflow
Which of these options would be included in a scan to identify a common misconfiguration?
Router Admin Password
You are investigating a point-of-sale (POS) terminal to verify that financial information will be protected. Which one of the following signs indicates a potential skimmer is installed?
A bulky casing is installed over the card reader
Which internet-based threat intelligence source is hidden from search engines and indexes and is used by privacy advocates and criminals alike?
Dark Web
Which option includes verifying appropriate access controls, authentication controls, input validation, and proper logging, among others?
Identifying a lack of security controls
NA
A hacktivist group claims responsibility for infecting a manufacturer’s systems by planting an infected USB drive at the companies office. Which term describes this attack strategy?
Supply Chain
In this social engineering principle, the attacker attempts to trick personnel into releasing information by proving that is is fine to release the information based on the actions of others
Consensus
You have recently been notified by an application vendor that the application includes a rootkit. The manufacturer has released a patch that will remove the vulnerability from the application. What is a rootkit?
A collection of programs that grants a hacker administrative access to a computer or network
Which of these vulnerabilities is characterized by a user modifying a browser’s security settings to make it more convenient to visit web sites?
Misconfiguration/weak configuration
Management at your company has recently learned of brute force attacks that were experienced by competitors. They have asked you to make a presentation of these attacks. What is an example of a brute force attack?
Using a program to guess passwords from a SAM file
You need to ensure that backdoor applications are not installed on any devices in your network. Which tool is NOT a backdoor application?
Nessus
How does using a syslog server make processing more effecient?
A syslog server makes it easier to coordinate events and combine information into a single log
An attacker carried out an IP spoofing that included saturating your network with ICMP messages. Which attack occurred?
smurf
As your organization’s security administrator, you are reviewing the audit results to assess if your organization’s security baselines are maintained. In which phase of the security management life cycle are you engaged?
Monitor and Evaluate
NA
A hacker has called a company employee and learned the employee’s user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered?
Social Engineering
Which types of computers are targeted by RedPill and Scooby Doo attacks?
Virtual Machines
NA
You are describing attacks that specifically target virtual machines in cloud-based deployment environments. Which of the following is an example of a virtual machine attack?
Hyperjacking
You work for a small company that stores password files on an authentication server. To which type of attack are these files vulnerable?
A dictionary attack
NA
What is the goal when you passively test security controls?
Probing for weaknesses
While holding security awareness training for employees, you discuss a security threat that often uses tracking cookies to collect and report on a user’s activities. Which threat are you discussing?
Spyware
A man wearing a service provider’s coveralls and carrying a toolbox approaches your facilities security guard. He says that his work crew is running some new Ethernet cable inside your office, but he left his mobile phone at home, so he can’t call his crew to let him in. Which social engineering attack techniques were used?
Pretexting, Impersonation
You have just been hired as the systems administrator for a research and development firm. Your organization allows the employees to use social media at work. What particular concern should you voice to management?
Data Exfiltration
Which SIEM feature would be best for long-term storage and security?
Logs/WORM
Which threat actor type would most likely have the most resources available?
Nation States
Which of the following is the best description of a zero-day exploit?
An attack that exploits a security vulnerability on the day the vulnerability becomes generally known
Your company contracts with a third-party janitorial service to clean the offices every night. Which one of these policies presents the greatest risk to the organization if it is NOT implemented?
Clean Desk Policy
Which team is responsible for taking on the role of an attacker during the simulation of a security incident?
Red Team
You are describing how multiple techniques can be applied in a single attack. Which type of attack combines IP spoofing with the act if inserting malicious code in packets?
Man-in-the-middle
NA
You have discovered that hackers are gaining access to your WEP wireless network. After researching, you discover that the hackers are using war driving. You need to protect against this type of attack. What should you do?
Configure the network to use WPA or WPA2, Change the default Service Set Identifier (SSID), Configure the network to use authenticated access only, Disable SSID broadcast
Management is worried about an evil twin. Which of the following BEST describes this entity?
An access point with the same SSID as the legitimate access point
You need to ensure that your companies anti-virus application protects against viruses that include protective code that prevents outside examination of critical elements. Which type of virus is this?
Armored Virus
NA
Your organization recently experienced an XSS attack. What is the best protection against this type of attack?
Disable the running of scripts
Which type of test relies heavily on automated scanning tools and reporting?
Vulnerability Test
Which threat actor type can be characterized by having an unsophisticated skill level, using widely available tools, and being often motivated by the need that they can prove that they can do it?
Script Kiddies
As part of your companies comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your companies subnetworks. Which statement is true of this scan?
It impacts the hosts and network less than other scan types
Which type of attack relies on mistakes made by users when they input Web addresses
URL Highjacking
NA
Which team is responsible for debriefing both attackers and defenders after an attack simulation?
Purple Team
You are exploring the attack surface of a Windows 10 host. Which scripting environment is an automation standard for modern Windows systems?
PowerShell
You are exploring the attack surface of a Linux host. Which scripting environment is an automation standard for most Linux/Unix systems?
Bash
Which type of state-sponsored attack targets another states critical vulnerabilities in cyberspace, so as to weaken that state’s governance or sow dissent throughout its populace
Hybrid Warfare
Your company underwent an attack that involved an attacker injecting a command to access the underlying file system. Which type of attack occurred
Directory Traversal
Microsoft releases a notification to all users that a vulnerability has been recently discovered in SQL. Server 2017 (version 14.0) that could allow an attacker to control your computer remotely. They are working on a fix, but do not have a workaround available. Which term best describes this risk?
Zero-day Vulnerability
A use notifies you that a software application displays advertisements while the application is executing. Of which security threat is this an example?
Adware
Your organization uses several applications that are considered to be multithreaded. Which memory vulnerability is associated with these application?
Race Condition
Your company has recently implemented a content inspection application on a perimeter firewall. What is the purpose of content inspection?
To search for malicious code or behavior
Your organization has asked the security team to add terrorist attacks to the organization’s business continuity plan. Which type of threat does this most likely represent?
Politically motivated threat
NA
Which type of threat involves a highly skilled group of attackers that keep their presence hidden, so that they can continually exploit their targets?
APT