section 3-4 Flashcards

1
Q

A well-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the best defense against this scenario?

a.
Configuring signature-based antivirus to update every 30 minutes.
b.
Enforcing S/MIME for email and automatically encrypting USB drives upon insertion.
c.
Implementing application execution in a sandbox for unknown software.
d.
Fuzzing new files for vulnerabilities if they are not digitally signed.

A

c.
Implementing application execution in a sandbox for unknown software.Your Answer: Correct
Implementing application execution in a sandbox for unknown software allows for the safe execution and analysis of potentially malicious code in an isolated environment, preventing it from affecting the main system. This approach is effective against custom malware introduced through emails or USB sticks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

a.
A worm is propagating across the network.
b.
Data is being exfiltrated.
c.
A logic bomb is deleting data.
d.
Ransomware is encrypting files.

A

b.
Data is being exfiltrated.Your Answer: Correct
Unusual DNS queries, especially during non-business hours, often indicate data exfiltration. Attackers may use DNS tunneling to stealthily transfer data out of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?

a.
Apply a DLP solution.
b.
Implement network segmentation.
c.
Utilize email content filtering.
d.
Isolate the infected attachment.

A

b.
Implement network segmentation.Your Answer: Correct
While isolating the infected attachment can stop the immediate threat from that specific file, implementing network segmentation provides a broader defense by containing the worm and preventing it from spreading to other parts of the network. This approach is more comprehensive and effective in mitigating further spread of the infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output CPU 0 percent busy, from 300 sec ago. 1 sec ave 99 percent busy. 5 sec ave 97 percent busy. 1 min ave 83 percent busy. Which of the following is the router experiencing?

a.
DDoS attack.
b.
Memory leak.
c.
Buffer overflow.
d.
Resource exhaustion.

A

c.
The CIRT.Your Answer: Correct
The Computer Incident Response Team (CIRT) is responsible for responding to security incidents, investigating breaches, and mitigating their impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The SIEM at an organization has detected suspicious traffic coming from a workstation in its internal network. An analyst in the SOC investigates the workstation and discovers malware associated with a botnet is installed on the device. A review of the logs on the workstation reveals that the privileges of the local account were escalated to a local administrator. To which of the following groups should the analyst report this real-world event?

a.
The NOC team.
b.
The vulnerability management team.
c.
The CIRT.
d.
The red team.

A

d.
A RAT.Your Answer: Correct
A Remote Access Trojan (RAT) allows attackers to control an infected system remotely. The scenario described aligns with typical RAT behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user’s knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

a.
A bot.
b.
A fileless virus.
c.
A logic bomb.
d.
A RAT.

A

a.
A RAT.Your Answer: Correct
A Remote Access Trojan (RAT) is designed to give attackers control over the infected systems. RATs often operate stealthily, evading traditional antivirus detection, and are typically used to establish external communications with command-and-control servers during off-peak hours to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 200 am - 400 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?

a.
A RAT.
b.
Ransomware.
c.
Polymorphic.
d.
A worm.

A

a.
A RAT.Correct
A Remote Access Trojan (RAT) is designed to give attackers control over the infected systems. RATs often operate stealthily, evading traditional antivirus detection, and are typically used to establish external communications with command-and-control servers during off-peak hours to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware spread across a company’s network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?

a.
Impersonation.
b.
Disinformation.
c.
Watering-hole.
d.
Smishing.

A

c.
Watering-hole.Your Answer: Correct
A watering-hole attack targets users by compromising websites they are likely to visit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

a.
Virus.
b.
Trojan.
c.
Spyware.
d.
Ransomware.

A

d.
Ransomware.Your Answer: Correct
The extension .ryk and the message displayed indicate a ransomware infection, where files are encrypted, and a ransom is demanded for their release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A systems administrator receives the following alert from a file integrity monitoring tool The hash of the cmd.exe file has changed. The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

a.
The end user changed the file permissions.
b.
A cryptographic collision was detected.
c.
A snapshot of the file system was taken.
d.
A rootkit was deployed./A change in the hash of a critical system file like cmd.exe without any recent patches suggests that the file may have been tampered with maliciously. A rootkit can alter system files to hide its presence and gain persistent access to the system, which is consistent with this type of alert.

A

d.
A rootkit was deployed./A change in the hash of a critical system file like cmd.exe without any recent patches suggests that the file may have been tampered with maliciously. A rootkit can alter system files to hide its presence and gain persistent access to the system, which is consistent with this type of alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going to the polls. This is an example of

a.
Prepending.
b.
An influence campaign.
c.
A watering-hole attack.
d.
Intimidation.
e.
Information elicitation.

A

b.
An influence campaign.Correct Answer
An influence campaign is an effort to affect the opinions and behaviors of a target audience, in this case, spreading misinformation to deter voters from going to the polls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?

a.
Smishing.
b.
Phishing.
c.
Impersonating.
d.
Vishing.

A

d.
Vishing.Correct Answer
Vishing (voice phishing) is a type of social engineering attack where the attacker uses the phone to trick someone into giving sensitive information or performing certain actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An employee receives a text message from an unknown number claiming to be the company’s Chief Executive Officer and asking the employee to purchase several gift cards. Which of the following types of attacks does this describe?

a.
Vishing.
b.
Smishing.
c.
Pretexting.
d.
Phishing.

A

b.
Smishing.Correct Answer
Smishing is a type of social engineering attack where the attacker uses SMS text messages to trick victims into revealing personal information or performing actions such as purchasing gift cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After a security awareness training session, a user called the IT help desk and reported a suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit card information in order to close an invoice. Which of the following topics did the user recognize from the training?

a.
Insider threat.
b.
Email phishing.
c.
Social engineering.
d.
Executive whaling.

A

c.
Social engineering.Correct Answer
Social engineering: Manipulating people into divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An engineer moved to another team and is unable to access the new team’s shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access?

a.
Role-based.
b.
Discretionary.
c.
Time of day.
d.
Least privilege.

A

a.
Role-based.Correct
Role-based access control (RBAC) restricts access based on the user’s role within an organization. Since the engineer was not moved to the new group, their role-based permissions did not update, causing the lack of access to the new team’s folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

a.
Multifactor authentication.
b.
Permissions assignment.
c.
Access management.
d.
Password complexity.

A

a.
Multifactor authentication.Correct Answer
Multifactor authentication adds an additional layer of security by requiring users to provide two or more verification factors to gain access, making it harder for attackers to compromise accounts with just a password.

17
Q

Which of the following scenarios describes a possible business email compromise attack?

a.
An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
b.
Employees who open an email attachment receive messages demanding payment in order to access files.
c.
A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
d.
An employee receives an email with a link to a phishing site that is designed to look like the company’s email portal.

A

c.
A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.Correct Answer
This scenario involves an attacker impersonating a trusted individual (HR director) to trick the recipient into providing sensitive information, which is characteristic of a business email compromise attack.

18
Q

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated ‘I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to the following email address.’ Which of the following are the best responses to this situation? (Choose two).

a. Cancel current employee recognition gift cards.
b. Add a smishing exercise to the annual company training.
c. Issue a general email warning to the company.
d. Have the CEO change phone numbers.
e. Conduct a forensic investigation on the CEO’s phone.
f. Implement mobile device management.

A

b. Add a smishing exercise to the annual company training.Your Answer: Correct
Adding a smishing exercise will help employees recognize and respond to fraudulent messages.

c. Issue a general email warning to the company.Your Answer: Correct
Issuing a general email warning will inform everyone about the specific scam and increase awareness.

19
Q

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)

a. Typosquatting.
b. Phishing.
c. Impersonation.
d. Vishing.
e. Smishing.
f. Misinformation.

A

c. Impersonation.

e. Smishing.

20
Q

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a ‘page not found’ error message. Which of the following types of social engineering attacks occurred?

a.
Brand impersonation.
b.
Pretexting
c.
Typosquatting.
d.
Phishing.

A

d.
Phishing.Correct Answer
Phishing involves tricking individuals into providing sensitive information by pretending to be a legitimate entity, as seen in the fake payment website scenario.