Security+ Practice Tests 1-5 Flashcards

1
Q

Registering a misspelled domain name in the hopes of getting traffic from unsuspecting users who type the URL in wrong.

A

URL hijacking
AKA typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attaching a piece of data to the beginning of another

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A form of cyberattack that targets a group of users by infecting websites that they commonly visit.

A

Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the platform for watering hole attacks?

A

Websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where does a fileless virus reside?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of a C2 server?

A

Botnet control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A computer controlled by an attacker used to send commands to systems compromised by malware.

A

C2 (Command and Control) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware that restricts access to a computer system by encrypting data.

A

Cryptomalware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of trojan that enables remote access to a compromised system.

A

RAT (Remote Access Trojan)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which attack uses a short list of commonly used passwords tried against a large number of user accounts?

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The practice of making an unauthorized copy of a payment card.

A

Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An AI feature that enables it to accomplish tasks based on training data without explicit human instructions.

A

ML (machine learning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a hashing algorithm produces the same hash value for two distinct pieces of data.

A

Hash collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A cryptographic attack that forces a network protocol to revert to its older, less secure version.

A

Downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A means of restricting access to system resources based on the sensitivity of the information and the clearance of users to access information of such sensitivity.

A

MAC (Mandatory Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which attack would use this string?:

SELECT * FROM users WHERE userName=’Alice’ AND password =” OR ‘1’=’1’;

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.

A

DLL (dynamic link library)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of application attack that relies on executing a library of code.

A

DLL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which type of attack would use these bits of string?:

Administrator)&))
Search.aspx?name=username)(zone=*)

A

LDAP injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A vulnerability in which queries are constructed from untrusted input without proper validation or sanitization.

A

LDAP injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A protocol that makes it possible for applications to query user information.

A

LDAP (lightweight directory access protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which type of attack would use this string?

…p@$$w0rd</password></user><user><name>attacker</name></user>

A

XML injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A language format that’s commonly used for storing, transmitting, and reconstructing data.

A software- and hardware-independent tool for storing and transporting data.

A

XML (extensible markup language)

For example:

<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A category of vulnerabilities where an application doesn’t correctly validate/sanitize user input before using it in an XML document or query.

A

XML injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A malicious attempt to trick a web application into displaying the contents of a directory other than the one requested by the user and gain access to sensitive files on a server.

A

Directory traversal attack
AKA dot-dot-slash attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which type of attack would use these URLs?:

http://www.example.com/var/../etc/passwd
http://www.example.com/var/www/../../../etc/passwd
http://www.example.com/var/www/files/../../../etc/passwd
http://www.example.com/var/www/files/images/../../../../etc/passwd

A

Directory traversal attack
AKA dot-dot-slash attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application.

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A situation in which an application writes to an area of memory it’s not supposed to have access to.

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A malfunction in a preprogrammed sequential access to a shared resource.

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence to be done correctly.

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A vulnerability caused by race conditions.

A

TOCTOU (time-of-check time-of-use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A class of software bugs caused by a race condition involving the checking of the state of a part of a system and the use of the results of that check.

A

TOCTOU (time-of-check time-of-use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When software checks the state of a resource before using that resource, but the resource’s state changes between the check and the use in a way that invalidates the results of the check.

A

TOCTOU (time-of-check time-of-use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The average time between system breakdowns.

A

MTBF (mean time between failures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The average amount of time a non-repairable asset operates before it fails.

A

MTTF (mean time to failure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which 2 programming aspects are critical to secure application development processes?

A

Input validation
Error and exception handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A situation in which a web form field accepts data other than expected

A

Improper input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A countermeasure against code injection

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.

A

Network replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.

A

Session replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A programming error where an application tries to store a numeric value in a variable that’s too small to hold it.

A

Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A type of exploit that allows an attacker to take control over a server and use it as a proxy for unauthorized actions.

A

SSRF (server side request forgery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An attack where an attacker executes arbitrary JavaScript within the browser of a victim user.

A

XSS (cross-site scripting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An attack where an attacker induces a victim user to perform actions that they do not intend to.

A

XSRF (cross-site request forgery)
AKA CSRF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What enables the exchange of information between computer programs?

A

API (application programming interface)

Most web APIs sit between the application and the web server. The user initiates an API call that tells the application to do something, then the application will use an API to ask the web server to do something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the purpose of a DoS attack?

A

Resource exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required.

A

Memory leak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SSL stripping is a type of what two attacks?

A

Downgrade attack
On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An attack performed by a malicious user that leads to a downgrade from an HTTPS secure connection to a less secure encrypted HTTP connection. As a result, the whole web connection is not encrypted anymore.

A

SSL stripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An attack where an attacker sits in the center between two stations and can catch and sometimes change the data that is being sent across the organization.

A

On-path attack
MITM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version.

A

Downgrade attack
AKA version rollback attack
AKA bidding-down attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A software/hardware driver manipulation technique. A cyberattack technique that allows an attacker to alter the external behavior of an application without introducing any changes to the application’s code.

A

Shimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

SDK stands for:

A

Software development kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Installing software obtained from a third-party source rather than an official retailer.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A software/hardware driver manipulation technique. The practice of modifying an application’s code without changing its external behavior.

A

Refactoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The process of a client application submitting a request to an API and that API receiving the requested data from the external server or program and delivering it back to the client.

A

API call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

2 methods that refer to software/hardware driver manipulation techniques.

A

Refactoring
Shimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A technique that allows an attacker to authenticate to a remote server without extracting cleartext passwords from a digest.

A

Pass the hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

The term that refers to a rogue WAP set up for eavesdropping or stealing sensitive user data.

This rogue WAP replaces the legitimate access point and by advertising its own presence with the same SSID (network name) appears as a legitimate access point to connecting hosts.

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Gaining unauthorized access to a Bluetooth device.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The practice of sending unsolicited messages over Bluetooth.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A wireless disassociation attack is a type of which 2 attacks?

A

Deauthentication attack
DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An attack that sends forged deauthentication frames to a WAP or client device, causing the device to disconnect from the network.

A

Wireless deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

An attack that sends forged disassocation frames to a WAP, causing the device to no longer be associated to the WAP.

The client can still be authenticated to a previously associated network, and they may send reassociation requests to the network they were disconnected from to resume connection.

A

Disassociation attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Wireless jamming is a type of which attack?

A

DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

An attack in which an attacker transmits interfering wireless signals to decrease the signal-to-noise ratio at the receiving device.

A

RF (radio frequency) jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

An attack in which an attacker sends random bits of data over a network to use up the bandwidth. This attack may happen intermittently, constantly, or by targeting times in which one individual is attempting to communicate.

A

Wireless jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A wireless technology that enables identification and tracking of tags attached to objects.

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder.

A

RFID badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

WTLS stands for

A

Wireless transport layer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

WAF stands for

A

Web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A hardware authentication device used to grant access to a restricted digital asset.

A

Hard token

For example, keys, USB drives, badges, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A digital authentication device used to grant access to a restricted digital asset.

A

Soft token

For example, multi-factor authentication, authenticator apps, clickable authentication links, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

RFID is vulnerable to which attack(s)?

Spoofing
Eavesdropping
Data interception
Replay attacks
DoS attacks
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

A technology used for contactless payment transactions.

A

NFC (near field communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

NFC is vulnerable to which attack(s)?

Data interception
Replay attacks
DoS attacks
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which 2 processes provide randomization during the encryption process?

A

Salting
IV (Initialization Vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A binary vector used as the input to initialize the algorithm for encryption to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.

This produces a unique stream independent from other streams produced by the same encryption key.

A

IV (Initialization Vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A type of attack also known as a MITM attack.

Attackers place themselves on the communication route between two devices.

Attackers intercept or modify packages sent between two communicating devices.

A

On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A network attack that compromises the security of a network switch by overflowing its memory used to store the MAC address table.

A

MAC (Media Access Control) flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as which 2 names?

A

MAC spoofing
MAC cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

A technique by which an attacker sends spoofed ARP messages onto a network. This does NOT spoof the IP or MAC address. The attacker merely responds first to the ARP request before the legitimate device is able to.

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

4 examples of layer 2 attacks

A

MAC cloning
ARP poisoning
MAC flooding
MAC spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A situation in which domain registrants, due to unlawful actions of third parties, lose control over their domain names.

A

Domain hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

A type of network attack where the intruder attempts to disrupt the network’s normalcy, modify data, and alter the system resources.

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

A type of network attack where the intruder intercepts data traveling through the network. They eavesdrop, but do not modify the message. (MITM is a type of this network attack.)

A

Passive attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which of the following answers refer to smishing? (Select 2 answers)
Social engineering
Email communication
SPIT
SPIM
Text messaging

A

Social engineering
Text messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The practice of using a telephone system to manipulate user into disclosing confidential information is known as:

A

Vishing

92
Q

A term describing an unsolicited advertising message

A

Spam

Remember that adware causes spam, but adware is NOT the message itself. It is only the software that causes it.

93
Q

What type of spam relies on text-based communication?

Vishing
SPIM
Bluesnarfing
SPIT

A

SPIM (spam over internet messaging)

94
Q

Phishing scams targeting a specific group of people

A

Spear phishing

95
Q

The practice of sifting through trash for discarded documents containing sensitive data.

A

Dumpster diving

96
Q

A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:

A

Shoulder surfing

97
Q

Which of the following answers refer to the characteristic features of pharming? (Select 3 answers)

Domain hijacking
Traffic redirection
Fraudulent website
Password attack
Credential harvesting

A

Traffic redirection
Fraudulent website
Credential harvesting

Remember that pharming often involves the victim clicking on a link to redirect them to the fraudulent website.

98
Q

Gaining unauthorized access to restricted areas by following another person

A

Tailgating

99
Q

The use of casual conversation to extract non-public information from people without giving them the feeling they’re being interrogated.

A

Elicitation

100
Q

A type of social engineering attack that involves providing a high and low estimate in order to entice a more specific number

A

Bracketing

101
Q

A type of social engineering attack that involves pretending to divulge confidential information in hopes of receiving confidential information in return

A

Confidential bait

102
Q

A type of social engineering attack that involves saying something wrong in the hopes that the person will correct the statement with true information

A

Deliberate false statements
AKA Denial of the obvious

103
Q

A type of social engineering attack that involves pretending to be ignorant of a topic in order to exploit the person’s tendency to educate

A

Feigned ignorance

104
Q

A type of social engineering attack that involves using praise to coax a person into providing information

A

Flattery

105
Q

Phishing scams targeting people holding high positions in a business

A

Whaling

106
Q

Which of the following is used in data URL phishing?

Prepending
Typosquatting
Pretexting
Domain hijacking

A

Prepending

107
Q

The use of emails to redirect recipients to a fake website and coerce them into divulging sensitive data.

A

Data URL phishing

108
Q

Adding something to the beginning of something else.

Used when an attacker attaches a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.

A

Prepending

109
Q

Use of a fabricated story to gain a victim’s trust and trick or manipulate them into sharing sensitive information, downloading malware, sending money to criminals, or otherwise harming themselves or the organization they work for.

A

Pretexting

110
Q

An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others would be an example of:

A

Virus hoax

111
Q

What is the platform for watering hole attacks?

A

Websites

112
Q

The internal telephone network of a business or other entity. It manages phone calls internally and externally for an organization.

A

PBX (Private Branch Exchange) system

113
Q

A type of email server that protects an organization’s or users’ internal email servers. It acts as a gateway through which every incoming and outgoing email passes through.

A

Email gateway

114
Q

The practice of registering misspelled domain name closely resembling other well established and popular domain name in hopes of getting Internet traffic from users who would make errors while typing in the URL in their web browsers.

A

URL hijacking
AKA typosquatting

115
Q

An attacker impersonates a company’s managing staff member to manipulate a lower rank employee into disclosing confidential data. The attacker informs the victim that the information is essential for a task that needs to be completed within the business hours on the same day and mentions potential financial losses for the company in case the victim refuses to comply. Which social engineering principles apply to this attack scenario? (Select 3 answers)

Urgency
Familiarity
Authority
Consensus
Intimidation
Scarcity

A

Urgency
Authority
Intimidation

Remember that this manager might not be very familiar with the lower ranking employee.

Urgency is because the task must be completed same-day.

Authority is because the attacker is impersonating the employee’s manager.

Intimidation is because they threatened the employee with financial loss.

116
Q

An attacker impersonating a software beta tester replies to a victim’s post in a forum thread discussing the best options for affordable productivity software. A while later, he/she follows up by sending the victim private message mentioning the discussion thread and offering free access to a closed beta version of a fake office app. Which social engineering principles apply to this attack scenario? (Select 3 answers)

Authority
Intimidation
Consensus
Scarcity
Familiarity
Trust
Urgency

A

Scarcity
Familiarity
Trust

Scarcity because it is a closed beta version not available to anyone else

Familiarity because this is a person with whom the victim has already interacted with before

Trust because the attacker is impersonating a software beta tester

117
Q

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?

Scarcity
Authority
Consensus
Intimidation
Urgency

A

Consensus

118
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware

119
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

A

Ransomware

120
Q

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program. This type of malware might act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

A

Trojan horse

121
Q

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

A

Worm

122
Q

A cyberattack to gain illicit access of elevated rights, permissions, entitlements, or privileges beyond what is assigned for an identity, account, user, or machine. This attack can involve an external threat actor or an insider threat.

A

Privilege escalation

123
Q

Spam messages symptomatic of widely-used free instant messaging apps like Messenger, Whatsapp, Viber, Telegram, Skype and WeChat. These spam messages are usually commercial-type spam but can contain malware and spyware.

A

SPIM (spam over instant messaging)

124
Q

Unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.

A

SPIT (spam over internet telephony)
AKA vam (voice/VoIP spam)

125
Q

What is a PUP (Potentially Unwanted Program)? (Select 3 answers.)

Not explicitly classified as malware by AV software

An app downloaded and installed w/out the user’s consent (illegal app)

A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads

An app downloaded and installed with the user’s consent (legal app)

Explicitly classified as malware by AV software

A type of free, utility software often bundled with a paid app

A

Not explicitly classified as malware by AV software

A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads

An app downloaded and installed w/ the user’s consent

126
Q

A type of free, utility software often bundled with a paid app

A

Bloatware

127
Q

A malware-infected network host under remote control of a hacker is commonly referred to as:

A

Bot

128
Q

A private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc.

A

Extranet

129
Q

A private network contained within an enterprise that is used to securely share company information and computing resources among employees.

A

Intranet

130
Q

A network set up to catch a hacker’s attention. It’s designed to look, feel, and act just like a network packed tight with valuable resources. But it also contains plenty of monitoring tools.

A

Honeynet

131
Q

A keylogger is an example of what type of malware?

A

Spyware

132
Q

Malicious software collecting info about users w/out their knowledge/consent is known as:

A

Spyware

133
Q

A type of service that, through a joint digital channel, enables users to plan, book, and pay for multiple types of mobility services. The concept describes a shift away from personally-owned modes of transportation and towards mobility provided as a service.

A

MaaS (Mobility as a Service)

134
Q

An undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system

A

Backdoor

135
Q

Which password attack bypasses account-lockout policies?

Birthday
Spraying
Dictionary
Replay

A

Spraying attack

136
Q

T/F: One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.

A

True

137
Q

T/F: Rainbow tables are lookup tables used to speed up the process of password guessing.

A

True

138
Q

What are the contents of a rainbow table entry?

A

Hash/Password

139
Q

Due to added functionality in its plug, malicious USB cables can be used for:

GPS tracking
Capturing keystrokes
Sending and receiving commands
Delivering and executing malware
Any of the above

A

Any of the above

140
Q

Theft of personal data from a payment card is known as:

A

Skimming

141
Q

A technique in which an attacker moves from one compromised system to the next in a network.

A

Pivoting

142
Q

The process of unlocking or jailbreaking a device, such as a smartphone or tablet.

A

Rooting

143
Q

RAD stands for

A

Rapid Application Development

144
Q

A cryptographic attack that relies on the concepts of probability theory

A

Birthday

145
Q

A type of attack where the attacker has an access to the ciphertext and its corresponding plaintext (crib). His goal is to guess the secret key (or a number of secret keys) or to develop an algorithm which would allow him to decrypt any further messages.

A

KPA (known-plaintext attack)

146
Q

AAA stands for

A

Authentication, Authorization, Accounting

147
Q

T/F: A situation where a cryptographic hash function produces two different digests for the same data input is referred to as a hash collision.

A

False

A hash collision is where 2 different data inputs have the same hash

148
Q

A situation where a cryptographic hash function produces the same message digest for two distinct data inputs.

A

Hash collision

149
Q

A type of cryptographic attack that forces a network protocol to revert to its older, less secure version is known as:

A

Downgrade attack

150
Q

Which of the following facilitate(s) privilege escalation attacks? (Select all that apply)

System/application vulnerability
Principle of least authority
Social engineering techniques
MAC (Mandatory Access Control)
System/application misconfiguration

A

System/application vulnerability
Social engineering techniques
System/application misconfiguration

Remember that Mandatory Access Control and principle of least authority are both ways to PREVENT a privilege escalation attack.

151
Q

Which of the following answers can be used to describe characteristics of a cross-site scripting attack? (Select 3 answers)

Exploits the trust a user’s web browser has in a website

A malicious script is injected into a trusted website

User’s browser executes the attacker’s script

Exploits the trust a website has in the user’s web browser

A user is tricked by an attacker into submitting unauthorized web requests

Website executes attacker’s requests

A

Exploits the trust a user’s web browser has in a website

A malicious script is injected into a trusted website

User’s browser executes the attacker’s script

152
Q

Which of the following indicates an SQL injection attack attempt?

DELETE FROM itemDB WHERE itemID = ‘1’;

SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’;

DROP TABLE itemDB;

SELECT * FROM users WHERE email = ‘example@example.com’ AND password = ‘’;

A

SELECT * FROM users WHERE userName = ‘Alice’ AND password = ‘’ OR ‘1’ = ‘1’;

153
Q

Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)

… AND password = ‘’ OR ‘1’ = ‘1’;

administrator)(&))

 malicious script code 

search.aspx?name=userName)(zone=*)

… p@$$w0rd</password></user><user><name>attacker</name> ....</user>

A

administrator)(&))

search.aspx?name=userName)(zone=*)

154
Q

Which of the following fragments of input might indicate an XML injection attack attempt?

 malicious script code 

search.aspx?name=userName)(zone=*)

… p@$$w0rd</password></user><user><name>attacker</name> ....</user>

administrator)(&))

… AND password = ‘’ OR ‘1’ = ‘1’;

A

… p@$$w0rd</password></user><user><name>attacker</name> ....</user>

155
Q

An attempt to read a variable value from an invalid memory address?

A

Null-pointer deference

156
Q

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:

A

Buffer overflow

157
Q

A type of attack in which the attacker uses mathematical algorithms to predict the IV in encryption. Once the IV is known, the attacker can use it to decrypt encrypted messages.

A

IV attack

158
Q

An automated software testing method that injects invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities. A tool injects these inputs into the system and then monitors for exceptions such as crashes or information leakage.

A

Fuzz test

159
Q

A malfunction in a preprogrammed sequential access to a shared resource is described as:

A

Race condition

160
Q

The process of reorganizing data in a database so that it meets two basic requirements: There is no redundancy of data, all data is stored in only one place.

A

Normalization

161
Q

Which of the following are the characteristic features of a session ID? (Select 3 answers)

Stored on a server

A unique identifier assigned by the website to a specific user

Contains user’s authentication credentials, e.g. username and password

A piece of data that can be stored in a cookie, or embedded as an URL parameter

Stored in a visitor’s browser

A unique identifier assigned to a server

A

A unique identifier assigned by the website to a specific user

A piece of data that can be stored in a cookie, or embedded as a URL parameter

Stored in a visitor’s browser

162
Q

Which type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions?

A

SSRF (Server-side request forgery)

163
Q

Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)

Exploits the trust a website has in the user’s web browser

A user is tricked by an attacker into submitting unauthorized web requests

Website executes attacker’s requests

Exploits the trust a user’s web browser has in a website

A malicious script is injected into a trusted website

User’s browser executes attacker’s script

A

Exploits the trust a website has in the user’s web browser

A user is tricked by an attacker into submitting unauthorized web requests

Website executes attacker’s requests

164
Q

T/F: In an on-path attack, attackers generate forged packets and inject them in the network.

A

False

A MITM attack is AKA eavesdropping attack. It does not involve forging new data.

165
Q

SDN stands for

A

Software-Defined Networking

166
Q

An approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.

A

SDN (Software-Defined Networking)

167
Q

PED stands for

A

Portable electronic device

168
Q

The process of hiding original data with modified content such as characters or other data

A

Obfuscation

169
Q

The process of hiding original data with modified content such as characters or other data

A

Obfuscation

170
Q

A type of network attack which involves the attacker injecting their own forged packets into the data stream.

A

Packet injection attack

171
Q

APT stands for

A

Active Persistent Threat

172
Q

Remapping a domain name to a rogue IP address is what kind of exploit?

A

DNS poisoning

173
Q

URL redirection is a characteristic feature of what kind of attack?

A

Pharming

174
Q

Which has the biggest impact on domain reputation?

Domain age
Missing SSL certificate
Derivative content
Bounce rate
Distribution of spam

A

Distribution of spam

175
Q

What is the most common form of DDoS attack?

A

Network-based

176
Q

Which type of DDoS attack uses IoT devices as bots to carry out the attack?

A

IoT-based

177
Q

OT stands for

A

Operational Technology

178
Q

The use of hardware and software to monitor and control physical processes, devices, and infrastructure.

A

OT (Operational Technology)

179
Q

Robots, industrial control systems (ICS), Supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLCs), and computer numerical control (CNC) are examples of what?

A

OT (Operational Technology)

180
Q

Which type of DDoS attack industrial equipment and infrastructure?

A

OT

181
Q

Which type of DDoS attack targets application services such as web servers and application firewalls?

A

Application

182
Q

ATT&CK stands for

A

Adversarial Tactics, Techniques, and Common Knowledge

183
Q

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

A

ATT&CK

184
Q

IoC stands for

A

Indicators of Compromise

185
Q

During a cybersecurity incident, the digital breadcrumbs that reveal that an attack has occurred, what tools were used in the attack, and who’s behind it.

A

IoC (Indicators of Compromise)

186
Q

Microsoft PowerShell script file extension

A

.ps1

187
Q

A filename extension used in a cross-platform, general-purpose programming language?

A

.py (Python programming language)

188
Q

A filename extension for a UNIX shell executable file.

A

.sh

189
Q

A filename extension for a Microsoft Visual Basic file

A

.vbs

190
Q

A filename extension for a batch file

A

.bat

191
Q

DOM stands for

A

Document Object Model

192
Q

An application programming interface (API) for HTML and XML documents. It defines the logical structure of documents and the way a document is accessed and manipulated.

It connects web pages to scripts or programming languages by representing the structure of a document in memory.

It represents a document with a logical tree. Each branch of the tree ends in a node, and each node contains objects. With them, you can change the document’s structure, style, or content.

A

DOM (Document Object Model)

193
Q

VBA stands for

A

Visual Basic for Applications

194
Q

Which of the following enables running macros in Microsoft Office applications?

A

VBA (Visual Basic for Applications)

195
Q

A computer programming language developed and owned by Microsoft.
Used to create macros to automate repetitive word- and data-processing functions, and generate custom forms, graphs, and reports.

A

VBA (Visual Basic for Applications)

196
Q

A filename extension for JavaScript file

A

.js

197
Q

A filename extension for a source code file created in Visual Basic language

A

.vb

198
Q

Which statements best describe the attributes of an APT? (Select 3 answers)

Lack of extensive resources/funding

High level of technical sophistication

Extensive amount of resources/funding

Threat actors are individuals

Low level of technical sophistication

Typically funded by governments/nation states

A

High level of technical sophistication

Extensive amount of resources/funding

Typically funded by governments/nation states

199
Q

A disgruntled employee abusing legitimate access to a company’s internal resources is called

A

Insider threat

200
Q

A person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

A

Script kiddie

201
Q

Hackers that use their technical skills to defraud and blackmail others.

A

Black hat

202
Q

Hackers that use their technical skills to protect the world from bad hackers.

A

White hat

203
Q

Hackers that use their technical skills with good intentions, but do not take the ethical route. They may penetrate networks to look for vulnerabilities without your consent, but do not cause harm.

A

Gray hat

204
Q

Hackers that use their technical skills with good intentions, but use extreme and sometimes illegal routes to achieve their goals. They deploy dangerous cyber attacks against black hat hackers.

A

Red hat

205
Q

Hackers that work as security professionals outside the organization. They are invited to test new software and find vulnerabilities. They perform penetration testing without causing damage.

A

Blue hat

206
Q

Hackers that are still learning about techniques and programming. This type is different from a script kiddie because this type of hacker works hard to continue to learn and develop skills.

A

Green hat

207
Q

Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors?

Political or economic motivation

High level of technical sophistication

Advanced Persistent Threat (APT)

High level of resources/funding

Typically classified as an internal threat

A

Typically classified as an internal threat

208
Q

A person who breaks into a computer network or system for a politically or socially motivated purpose is usually described as a(n):

A

Hacktivist

209
Q

Which statements best describe the attributes of a script kiddie? (Select 2 answers)

Motivated by money

Low level of technical sophistication

Motivated by ideology

High level of technical sophistication

Lack of extensive resources/funding

A

Low level of technical sophistication

Lack of extensive resoruces/funding

210
Q

Threat actors whose sole intent behind breaking into a computer system or network is monetary gain

A

Criminal syndicates

211
Q

People or groups who use their technology skills to facilitate hacking, sabotage, theft, misinformation and other operations on behalf of a country. They are state-sponsored.

A

Nation-state threat actors

212
Q

A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period of time. Usually done to steal data.

A

APT (Advanced Persistent Threat)

213
Q

Which types of hacking are authorized? (Select 2)

Black hat
Gray hat
White hat
Blue hat
Green hta

A

White hat
Blue hat

214
Q

Which types of hacking are unauthorized?

Gray hat
White hat
Black hat
Blue hat

A

Black hat

215
Q

Which type of hacking is semi-authorized?

Blue hat
Black hat
Gray hat
White hat

A

Gray hat

216
Q

Software and hardware used w/in an organization, but outside of the organization’s official IT infrastructure.

A

Shadow IT

217
Q

Threat actors that engage in illegal activities to get the know-how and gain market advantage?

A

Competitors

218
Q

Any combination of persons or enterprises engaging, or having the purpose of engaging, on a continuing basis in conduct that violates one or more provisions of a felony statute of a United States jurisdiction.

A

Criminal syndicate

219
Q

Which of the following answers does not relate to a direct access threat vector?

Malicious USB cable

Backdoor

Malicious URL

Lack of physical security controls

Malicious flash drive

A

Malicious URL

220
Q

Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)

Network protocol vulnerabilities (WEP/WPA)

Rogue AP / Evil twin

Default security configurations

Malicious email attachments

Vulnerabilities in network security standards (WPS)

A

Network protocol vulnerabilities (WEP/WPA)

Rogue AP/ evil twin

Default security configurations

Vulnerabilities in network security standards (WPS)

221
Q

WEP stands for

A

Wired Equivalent Privacy

It’s a sucky security protocol.

222
Q

WPA stands for

A

Wi-Fi Protected Access

More secure than WEP

223
Q

WPS stands for

A

Wi-Fi Protected Setup

A feature supplied with many routers. It is designed to make the process of connecting to a secure wireless network from a computer or other device easier. It makes routers extremely vulnerable to cyberattacks.

224
Q

A type of attack vector where the attacker gains physical access to a computer and performs malicious actions.

A

Direct access attack vector

225
Q

Which of the following enables client-side URL redirection?

host
hosts
hostname
localhost

A

hosts