Sec+ Objective 2 Test Questions Flashcards
A company’s website has been compromised and the website content has been replaced with a political message. Which of the following threat actors would be the MOST likely culprit?
❍ A. Insider
❍ B. Organized crime
❍ C. Shadow IT
❍ D. Hacktivist
D. Hacktivist
A hacktivist is motivated by a particular philosophy, and their goal is to spread their message by defacing web sites and releasing private documents. (2.1)
A user in the accounting department has received a text message from the CEO. The message requests payment by cryptocurrency for a recently purchased tablet. Which of the following would BEST describe this attack?
❍ A. Brand impersonation
❍ B. Watering hole attack
❍ C. Smishing
❍ D. Typosquatting
C. Smishing
Smishing is phishing using SMS (Short Message Service), and is more commonly referenced as text messaging. A message allegedly from the CEO asking for an unusual payments using cryptocurrency or gift cards would be categorized as smishing. (2.1)
Which of these threat actors would be MOST likely to install a company’s internal application on a public cloud provider?
❍ A. Organized crime
❍ B. Nation state
❍ C. Shadow IT
❍ D. Hacktivist
C. Shadow IT
Shadow IT is an internal organization within the company but is not part of the IT department. Shadow IT often circumvents or ignores existing IT policies to build their own infrastructure with company resources. (2.1)
Which of the following vulnerabilities would be the MOST significant security concern when protecting against a hacktivist?
❍ A. Data center access with only one authentication factor
❍ B. Spoofing of internal IP addresses when accessing an intranet server
❍ C. Employee VPN access uses a weak encryption cipher
❍ D. Lack of patch updates on an Internet-facing database server
D. Lack of patch updates on an Internet-facing
database server
One of the easiest ways for a third-party to obtain information is through an existing Internet connection. A hacktivist could potentially exploit an unpatched server to obtain unauthorized access to the operating system and data. (2.1)
A company maintains a server farm in a large data center. These servers are used internally and are not accessible from outside of the data center. The security team has discovered a group of servers was breached before the latest security patches were applied. Breach attempts were not logged on any other servers. Which of these threat actors would be MOST likely involved in this breach?
❍ A. Organized crime
❍ B. Insider
❍ C. Nation state
❍ D. Unskilled attacker
B. Insider
None of these servers are accessible from the outside, and the only servers with any logged connections were also susceptible to the latest vulnerabilities. To complete this attack, there would need a very specific knowledge of the vulnerable systems and a way to communicate with those servers. (2.1)
Which of the following would be the MOST significant security concern when protecting against organized crime?
❍ A. Prevent users from posting passwords near their workstations
❍ B. Require identification cards for all employees and guests
❍ C. Maintain reliable backup data
❍ D. Use access control vestibules at all data center locations
C. Maintain reliable backup data
A common objective for organized crime is an organization’s data, and attacks from organized crime can sometimes encrypt or delete data. A good set of backups can often resolve these issues quickly and without any ransomware payments to an organized crime syndicate. (2.1)
Which of these threat actors would be MOST likely to attack systems for direct financial gain?
❍ A. Organized crime
❍ B. Hacktivist
❍ C. Nation state
❍ D. Shadow IT
A. Organized crime
An organized crime actor is motivated by money, and their hacking objectives are usually based around objectives that can be easily exchanged for financial capital. (2.1)
Which of the following external threat actors commonly has limited resources and relatively low attack sophistication?
A) Unskilled
B) Shadow IT
C) Organized crime
D) Nation state
E) Hacktivist
A) Unskilled
Unskilled Attackers: Basically the opposite of a Nation State. Low skill, resources, and capability. Motivated by causing disruption and general chaos. They usually run pre-made scripts to attack your organization without really knowing how any of it works. Anyone can do this. Can be internal or external. (2.1)
A security technician has noticed unusual behavior from an employee who has access to sensitive customer data. The employee’s actions are suspicious, indicating potential malicious intent. What type of threat actor is the employee most likely categorized as?
A) Organized crime
B) Nation-state
C) Hacktivist
D) Insider threat
D) Insider threat
Insider Threat: A threat from the inside of your organization. Someone on the outside can squeazel their way in and then betray you. Motivated by revenge and financial gain. In this circumstance, your organization is their funding. They have institutional knowledge, and know what vulnerable systems to hit. (2.1)
What are common characteristics of external threat actors? (Select two)
A) Limited access to internal systems
B) Often motivated by financial gain
C) Typically have less sophisticated tools
D) Usually driven by political or ideological beliefs
A) Limited access to internal systems
and
B) Often motivated by financial gain
Threat Actor: The entity responsible for an event that has an impact on the safety of another entity. Also called a malicious actor.
The three important attributes to nail down when identifying a threat actor are
1) Are they internal or external
2) How much funding/resources do they have
3) What’s their level of sophistication/capability (2.1)
In a wartime scenario, which threat actors are most likely to be active?
A) Nation-state
B) Insider threats
C) Organized crime
D) Hacktivists
A) Nation-state
Nation State: A threat actor external to your organization associated with a government or national security of that government. They could have many motivations for attacking you, with lots of sophistication, capability, and resources. (2.1)
A security administrator is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?
❍ A. Create an operating system security policy to block
the use of removable media
❍ B. Monitor removable media usage in host-based firewall logs
❍ C. Only allow applications that do not use removable media
❍ D. Define a removable media block rule in the UTM
A. Create an operating system security policy to prevent the use of removable media
Removable media uses hot-pluggable interfaces such as USB to connect storage drives. A security policy in the operating system can prevent any files from being written to a removable drive. (2.2)
An attacker calls into a company’s help desk and pretends to be the director of the company’s manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?
❍ A. Social engineering
❍ B. Supply chain
❍ C. Watering hole
❍ D. On-path
A. Social engineering
This social engineering attack uses impersonation to take advantage of authority and urgency principles in an effort to convince someone else to circumvent normal security controls. (2.2)
A remote user has received a text message with a link to login and confirm their upcoming work schedule. Which of the following would BEST describe this attack?
❍ A. Brute force
❍ B. Watering hole
❍ C. Typosquatting
❍ D. Smishing
D. Smishing
Smishing, or SMS (Short Message Service) phishing, is a social engineering attack that asks for sensitive information using SMS or text messages. (2.2)
A company is in the process of configuring and enabling host-based firewalls on all user devices. Which of the following threats is the company addressing?
❍ A. Default credentials
❍ B. Vishing
❍ C. Instant messaging
❍ D. On-path
C. Instant messaging
Instant messaging is commonly used as an attack vector, and one way to help protect against malicious links delivered by instant messaging is a host-based firewall. (2.2)
A manufacturing company produces radar used by commercial and military organizations. A recently proposed policy change would allow the use of mobile devices inside the facility. Which of the following would be the MOST significant threat vector issue associated with this change in policy?
❍ A. Unauthorized software on rooted devices
❍ B. Remote access clients on the mobile devices
❍ C. Out of date mobile operating systems
❍ D. Loss of intellectual property
D. Loss of intellectual property
The exfiltration of confidential information and intellectual property is relatively simple with an easily transportable mobile phone. Organizations associated with sensitive products or services must always be aware of the potential for information leaks using files, photos, or video. (2.2)
An attacker has identified a number of devices on a corporate network with the username of “admin” and the password of “admin.” Which of the following describes this situation?
❍ A. Open service ports
❍ B. Default credentials
❍ C. Unsupported systems
❍ D. Phishing
B. Default credentials
When a device is first installed, it will often have a default set of credentials such as admin/password or admin/admin. If these default credentials are never changed, they would allow access by anyone who knows the default configuration. (2.2)
A security administrator attends an annual industry convention with other security professionals from around the world. Which of the following attacks would be MOST likely in this situation?
❍ A. Smishing
❍ B. Supply chain
❍ C. SQL injection
❍ D. Watering hole
D. Watering hole
A watering hole attack infects a third-party visited by the intended victims. An industry convention would be a perfect location to attack security professionals. (2.2)
When connected to the wireless network, users at a remote site receive an IP address which is not part of the corporate address scheme. Communication over this network is also slower than the wireless connections elsewhere in the building. Which of the following would be the MOST likely reason for these issues?
❍ A. Rogue access point
❍ B. Domain hijack
❍ C. DDoS
❍ D. Encryption is enabled
A. Rogue access point
A rogue access point is an unauthorized access point added by a user or attacker. This access point may not necessarily be malicious, but it does create significant security concerns and unauthorized access to the corporate network. (2.2)
A company’s network team has been asked to build an IPsec tunnel to a new business partner. Which of the following security risks would be the MOST important to consider?
❍ A. Supply chain attack
❍ B. Unsupported systems
❍ C. Business email compromise
❍ D. Typosquatting
A. Supply chain attack
A direct connection to a third-party creates potential access for an attacker. Most organizations will include a firewall to help monitor and protect against any supply chain attacks. (2.2)
What are supply chain vectors?
Third parties gaining access to your systems through established infrastructure in equipment, using an authorized vendor program to jump to an unauthorized system, and the utilization of counterfeit networking equipment.
An access point in a corporate headquarters office has the following configuration:
IP address: 10.1.10.1
Subnet mask: 255.255.255.0
DHCPv4 Server: Enabled
SSID: Wireless
Wireless Mode: 802.11n
Security Mode: WEP-PSK
Frequency band: 2.4 GHz
Software revision: 2.1
MAC Address: 60:3D:26:71:FF:AA
IPv4 Firewall: Enabled
Which of the following would apply to this configuration?
❍ A. Invalid frequency band
❍ B. Weak encryption
❍ C. Incorrect IP address and subnet mask
❍ D. Invalid software version
B. Weak encryption
A common issue is weak or outdated security configurations. Older encryptions such as DES and WEP should be updated to use newer and stronger encryption technologies. (2.2)
What type of cyber-attack occurs when employees of a company are tricked by a fake website that looks legitimate?
A) Identity theft
B) Misinformation
C) Watering-hole
D) Spear phishing
C) Watering-hole
Watering Hole Attack: An attacker, who cannot gain access to your network by conventional means, “poisons” a third party website that all of your employees visit, thus getting a foot in the door, and attacking your network indirectly. (2.2)
A security professional has noticed an increase in phone calls to employees, where the callers pose as IT support staff and request sensitive information such as login credentials. Some employees have unknowingly provided this information. Which technique is most likely being used to deceive employees through phone calls?
A) Typosquatting
B) Watering-hole
C) Vishing
D) Whaling
C) Vishing
Vishing: Voice fishing. An attacker lying to you over the phone to get your information. (2.2)
Frank was contacted by phone a person claiming to be an executive vice president urgently requesting that his password be reset. He insisted on the security urgency at hand and informed Frank that his supervisor would be contacted unless he complied immediately. Frank suspected that this was a social engineering attack. Which principles of human manipulation did the attacker attempt on Frank? Choose three.
A) Authority
B) Fright
C) Intimidation
D) Urgency
E) Scarcity
F) Trust
A) Authority
C) Intimidation
D) Urgency
Authority is a doubly correct answer here because the caller is made by someone impersonating an authority figure but also because of the threat to contact Frank’s supervisor. The threat consists of the threat to contact Frank’s supervisor. The urgency is referenced twice so clearly belongs to the correct choice. Neither trust nor scarcity apply in this scenario and Fright is a nonsense detractor as it is not a recognized category of human manipulation for social engineering. (2.2)
A security researcher has been notified of a potential hardware vulnerability. Which of the following should the researcher evaluate as a potential security issue?
❍ A. Firmware versions
❍ B. Firewall configuration
❍ C. SQL requests
❍ D. XSS attachments
A. Firmware versions
Firmware describes the software inside of a hardware device and is often used as the operating system of the hardware. Issues with hardware vulnerabilities are usually resolved by updating firmware in the vulnerable system. (2.3)
An attacker has circumvented a web-based application to send commands directly to a database. Which of the following would describe this attack type?
❍ A. Downgrade
❍ B. SQL injection
❍ C. Cross-site scripting
❍ D. On-path
B. SQL injection
A SQL (Structured Query Language) injection takes advantage of poorly written web applications. These web applications do not properly restrict the user input, and the resulting attack bypasses the application and “injects” SQL commands directly into the database itself. (2.3)
What is SQL injection?
Structured Query Language Injection. The most common database management system language is SQL. The injection occurs when an attacker puts their own SQL requests into an existing application. The application doesn’t normally allow this because it (should) be performing checks. Usually done within a web browser.
The embedded OS in a company’s time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?
❍ A. Memory injection
❍ B. Resource consumption
❍ C. Race condition
❍ D. Malicious update
C. Race condition
A race condition occurs when two processes occur at similar times, and usually with unexpected results. The file system problem can often be fixed before a reboot, but the reboot is occurring before the fix can be applied. This has created a race condition that results in constant reboots. (2.3)
What is a race condition?
Where two events happen at nearly the same time with an application, and the application doesn’t take into account that the two events are happening simultaneously.
A network team has installed new access points to support an application launch. In less than 24 hours, the wireless network was attacked and private company information was accessed. Which of the following would be the MOST likely reason for this breach?
❍ A. Race condition
❍ B. Jailbreaking
❍ C. Impersonation
❍ D. Misconfiguration
D. Misconfiguration
There are many different configuration options when installing an access point, and it’s likely one of those options allowed an attacker to gain access to the internal network. (2.3)
An organization has identified a significant vulnerability in an Internetfacing firewall. The firewall company has stated the firewall is no longer available for sale and there are no plans to create a patch for this vulnerability. Which of the following would BEST describe this issue?
❍ A. End-of-life
❍ B. Improper input handling
❍ C. Improper key management
❍ D. Incompatible OS
A. End-of-life
Because the firewall is no longer available for sale, the firewall company has decided to stop supporting and updating the device. A product no longer supported by the manufacturer is consider to be end-of-life. (2.3)
An attacker has sent more information than expected in a single API call, and this has allowed the execution of arbitrary code. Which of the following would BEST describe this attack?
❍ A. Buffer overflow
❍ B. Replay attack
❍ C. Cross-site scripting
❍ D. DDoS
A. Buffer overflow
The results of a buffer overflow can cause random results, but sometimes the actions can be repeatable and controlled. In the best possible case for the hacker, a buffer overflow can be manipulated to execute code on the remote device. (2.3)