Security+ Practice Tests 1-5 Flashcards
Registering a misspelled domain name in the hopes of getting traffic from unsuspecting users who type the URL in wrong.
URL hijacking
AKA typosquatting
Attaching a piece of data to the beginning of another
Prepending
A form of cyberattack that targets a group of users by infecting websites that they commonly visit.
Watering hole attack
What is the platform for watering hole attacks?
Websites
Where does a fileless virus reside?
RAM
What is the function of a C2 server?
Botnet control
A computer controlled by an attacker used to send commands to systems compromised by malware.
C2 (Command and Control) server
Malware that restricts access to a computer system by encrypting data.
Cryptomalware
A type of trojan that enables remote access to a compromised system.
RAT (Remote Access Trojan)
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network.
Rootkit
Which attack uses a short list of commonly used passwords tried against a large number of user accounts?
Spraying attack
The practice of making an unauthorized copy of a payment card.
Cloning
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions.
ML (machine learning)
When a hashing algorithm produces the same hash value for two distinct pieces of data.
Hash collision.
A cryptographic attack that forces a network protocol to revert to its older, less secure version.
Downgrade attack
A means of restricting access to system resources based on the sensitivity of the information and the clearance of users to access information of such sensitivity.
MAC (Mandatory Access Control)
Which attack would use this string?:
SELECT * FROM users WHERE userName=’Alice’ AND password =” OR ‘1’=’1’;
SQL injection
A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.
DLL (dynamic link library)
A type of application attack that relies on executing a library of code.
DLL injection
Which type of attack would use these bits of string?:
Administrator)&))
Search.aspx?name=username)(zone=*)
LDAP injection attack
A vulnerability in which queries are constructed from untrusted input without proper validation or sanitization.
LDAP injection
A protocol that makes it possible for applications to query user information.
LDAP (lightweight directory access protocol)
Which type of attack would use this string?
…p@$$w0rd</password></user><user><name>attacker</name></user>
XML injection attack
A language format that’s commonly used for storing, transmitting, and reconstructing data.
A software- and hardware-independent tool for storing and transporting data.
XML (extensible markup language)
For example:
<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>
A category of vulnerabilities where an application doesn’t correctly validate/sanitize user input before using it in an XML document or query.
XML injection
A malicious attempt to trick a web application into displaying the contents of a directory other than the one requested by the user and gain access to sensitive files on a server.
Directory traversal attack
AKA dot-dot-slash attack
Which type of attack would use these URLs?:
http://www.example.com/var/../etc/passwd
http://www.example.com/var/www/../../../etc/passwd
http://www.example.com/var/www/files/../../../etc/passwd
http://www.example.com/var/www/files/images/../../../../etc/passwd
Directory traversal attack
AKA dot-dot-slash attack
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application.
Buffer overflow
A situation in which an application writes to an area of memory it’s not supposed to have access to.
Buffer overflow
A malfunction in a preprogrammed sequential access to a shared resource.
Race condition
An undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.
Race condition
A vulnerability caused by race conditions.
TOCTOU (time-of-check time-of-use)
A class of software bugs caused by a race condition involving the checking of the state of a part of a system and the use of the results of that check.
TOCTOU (time-of-check time-of-use)
When software checks the state of a resource before using that resource, but the resource’s state changes between the check and the use in a way that invalidates the results of the check.
TOCTOU (time-of-check time-of-use)
The average time between system breakdowns.
MTBF (mean time between failures)
The average amount of time a non-repairable asset operates before it fails.
MTTF (mean time to failure)
Which 2 programming aspects are critical to secure application development processes?
Input validation
Error and exception handling
A situation in which a web form field accepts data other than expected
Improper input validation
A countermeasure against code injection
Input validation
When an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.
Network replay attack
When an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.
Session replay attack
A programming error where an application tries to store a numeric value in a variable that’s too small to hold it.
Integer overflow
A type of exploit that allows an attacker to take control over a server and use it as a proxy for unauthorized actions.
SSRF (server side request forgery)
An attack where an attacker executes arbitrary JavaScript within the browser of a victim user.
XSS (cross-site scripting)
An attack where an attacker induces a victim user to perform actions that they do not intend to.
XSRF (cross-site request forgery)
AKA CSRF
What enables the exchange of information between computer programs?
API (application programming interface)
Most web APIs sit between the application and the web server. The user initiates an API call that tells the application to do something, then the application will use an API to ask the web server to do something.
What is the purpose of a DoS attack?
Resource exhaustion
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required.
Memory leak
SSL stripping is a type of what two attacks?
Downgrade attack
On-path attack
An attack performed by a malicious user that leads to a downgrade from an HTTPS secure connection to a less secure encrypted HTTP connection. As a result, the whole web connection is not encrypted anymore.
SSL stripping
An attack where an attacker sits in the center between two stations and can catch and sometimes change the data that is being sent across the organization.
On-path attack
MITM attack
An attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.
Downgrade attack
AKA version rollback attack
AKA bidding-down attack
A software/hardware driver manipulation technique. A cyberattack technique that allows an attacker to alter the external behavior of an application without introducing any changes to the application’s code.
Shimming
SDK stands for:
Software development kit
Installing software obtained from a third-party source rather than an official retailer.
Sideloading
A software/hardware driver manipulation technique. The practice of modifying an application’s code without changing its external behavior.
Refactoring
The process of a client application submitting a request to an API and that API receiving the requested data from the external server or program and delivering it back to the client.
API call
2 methods that refer to software/hardware driver manipulation techniques.
Refactoring
Shimming
A technique that allows an attacker to authenticate to a remote server without extracting cleartext passwords from a digest.
Pass the hash.
The term that refers to a rogue WAP set up for eavesdropping or stealing sensitive user data.
This rogue WAP replaces the legitimate access point and by advertising its own presence with the same SSID (network name) appears as a legitimate access point to connecting hosts.
Evil twin
Gaining unauthorized access to a Bluetooth device.
Bluesnarfing
The practice of sending unsolicited messages over Bluetooth.
Bluejacking
A wireless disassociation attack is a type of which 2 attacks?
Deauthentication attack
DoS attack
An attack that sends forged deauthentication frames to a WAP or client device, causing the device to disconnect from the network.
Wireless deauthentication attack
An attack that sends forged disassocation frames to a WAP, causing the device to no longer be associated to the WAP.
The client can still be authenticated to a previously associated network, and they may send reassociation requests to the network they were disconnected from to resume connection.
Disassociation attack.
Wireless jamming is a type of which attack?
DoS attack
An attack in which an attacker transmits interfering wireless signals to decrease the signal-to-noise ratio at the receiving device.
RF (radio frequency) jamming
An attack in which an attacker sends random bits of data over a network to use up the bandwidth. This attack may happen intermittently, constantly, or by targeting times in which one individual is attempting to communicate.
Wireless jamming
A wireless technology that enables identification and tracking of tags attached to objects.
RFID
A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder.
RFID badge
WTLS stands for
Wireless transport layer security
WAF stands for
Web application firewall
A hardware authentication device used to grant access to a restricted digital asset.
Hard token
For example, keys, USB drives, badges, etc.
A digital authentication device used to grant access to a restricted digital asset.
Soft token
For example, multi-factor authentication, authenticator apps, clickable authentication links, etc.
RFID is vulnerable to which attack(s)?
Spoofing
Eavesdropping
Data interception
Replay attacks
DoS attacks
All of the above
All of the above
A technology used for contactless payment transactions.
NFC (near field communication)
NFC is vulnerable to which attack(s)?
Data interception
Replay attacks
DoS attacks
All of the above
All of the above
Which 2 processes provide randomization during the encryption process?
Salting
IV (Initialization Vector)
A binary vector used as the input to initialize the algorithm for encryption to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.
This produces a unique stream independent from other streams produced by the same encryption key.
IV (Initialization Vector)
A type of attack also known as a MITM attack.
Attackers place themselves on the communication route between two devices.
Attackers intercept or modify packages sent between two communicating devices.
On-path attack
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?
ARP poisoning
A network attack that compromises the security of a network switch by overflowing its memory used to store the MAC address table.
MAC (Media Access Control) flooding
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as which 2 names?
MAC spoofing
MAC cloning
A technique by which an attacker sends spoofed ARP messages onto a network. This does NOT spoof the IP or MAC address. The attacker merely responds first to the ARP request before the legitimate device is able to.
ARP poisoning
4 examples of layer 2 attacks
MAC cloning
ARP poisoning
MAC flooding
MAC spoofing
A situation in which domain registrants, due to unlawful actions of third parties, lose control over their domain names.
Domain hijacking
A type of network attack where the intruder attempts to disrupt the network’s normalcy, modify data, and alter the system resources.
Active attack
A type of network attack where the intruder intercepts data traveling through the network. They eavesdrop, but do not modify the message. (MITM is a type of this network attack.)
Passive attack
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering
Email communication
SPIT
SPIM
Text messaging
Social engineering
Text messaging