SYO-501 Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
A. Adware
B. Malware
C. Ransomware
D. Spyware
B. Malware
Which of the following answers refers to malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program?
A. Trojan horse
B. Spyware
C. Logic bomb
D. Adware
A. Trojan horse
What is adware?
A. Unsolicited or undesired electronic messages
B. Malicious programs that sends copies of itself to other computers on the network
C. Software that displays advertisements
D. Malicious software that collects information about users without their knowledge
C. Software that displays advertisements
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
A. Backdoor
B. Botnet
C. Rootkit
D. Armored virus
C. Rootkit
Which type of Trojan enables unauthorized remote access to a compromised system?
A. pcap
B. RAT
C. MaaS
D. pfSense
B. RAT
Which of the following answers refers to an undocumented way of gaining access to a program, online service, or an entire computer system?
A. Tailgaiting
B. Rootkit
C. Trojan horse
D. Backdoor
D. Backdoor
Phishing scams targeting selected individuals/groups of users are referred to as:
A. Vishing
B. Spear phishing
C. MITM attack
D. Whaling
B. Spear phishing
What is tailgating?
A. Looking over someone’s shoulder to get information
B. Scanning for unsecured wireless networks while driving in a car
C. Manipulating a user into disclosing confidential information
D. Gaining unauthorized access to restricted areas by following another person
D. Gaining unauthorized access to restricted areas by following another person
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others would be an example of:
A. Vishing
B. Impersonation
C. Virus hoax
D. Phishing
C. Virus hoax
Which of the following attacks uses multiple compromised computer systems against its target?
A. Spear phishing
B. DoS
C. Watering hole attack
D. DDos
D. DDos
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:
A. IV attach
B. SQL Injection
C. Buffer overflow
D. Fuzz test
B. Buffer overflow
Zero-day attack exploits:
A. New accounts
B. Patched software
C. Vulnerability that is present in already released software but unknown to the software developer
D. Well known vulnerability
C. Vulnerability that is present in already released software but unknown to the software developer
A replay attach occurs when an attacker intercepts user credentials and tries to use this information later for gaining unauthorized access to resources on a network.
A. True
B. False
A. True
URL hijacking is also referred to as:
A. Session hijacking
B. Sandboxing
C. Typo Squatting
D. Shoulder surfing
C. Typo squatting
Which of the following terms refers to a rogue AP?
A. Computer worm
B. Backdoor
C. Evil twin
D. Trojan horse
C. Evil twin
Which of the following technologies simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and a add new devices to an existing network?
A. WPA
B. WPS
C. WEP
D. WAP
B. WPS
The practice of sending unsolicited messages over Bluetooth is known as:
A. Bluejacking
B. Vishing
C. Bluesnarfing
D. Phishing
A. Bluejacking
Gaining unauthorized access to a Bluetooth device is referred to as:
A. Xmas attack
B. Bluesnarfing
C. Bluejacking
D. Pharming
B. Bluesnarfing
Which of the terms listed below is used to describe an unskilled individual exploiting computer security loopholes with the use of code and software written by someone else?
A. Script kiddies
B. Black hat hacker
C. Hactivist
D. White hat hacker
A. Script kiddies
Which of the following facilitate(s) privilege escalation attacks? (select all the apply)
A. System/application vulnerability B. Distributed Denial of Service (DDoS) C. Social engineering techniques D. Attribute-Based Acccess Control (ABAC) E. System/application misconfiguration
A. System/application vulnerability
C. Social engineering techniques
E. System/application misconfiguration
A penetration test conducted with the use of prior knowledge on how the system that is to be tested works is known as:
A. White hat
B. Sandbox
C. White box
D. Black box
C. White box
Penetration testing: (select all that apply)
A. Bypasses security controls B. Only identifies lack of security controls C. Actively tests security controls D. Exploits vulnerabilities D. Passively tests security controls
A. Bypasses security controls
C. Actively tests security controls
D. Exploits vulnerabilities
An antivirus software identifying non-malicious code as a virus due to faulty virus signature file is an example of:
A. Fault tolerance
B. False positive error
C. Incident isolation
D. False negative
B. False positive error
Which of the terms listed below refers to a situation where no alarm is raised when an attack has taken place?
A. False negative
B. True positive
C. False positive
D. True negative
A. False negative
Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operation are allowed on a given object?
A. CRL
B. NAT
C. BCP
D. ACL
D. ACL
Which IPsec mode provides whole packet encryptions?
A. Tunnel
B. Payload
C. Transport
D. Host-to-host
A. Tunnel
Which type of IDS relies on known attack patterns in order to detect an intrusion?
A. Behavior-based
B. Heuristic/behavioral
C. Signature-based
D. AD-IDS
C. Signature-based
A protocol that provides protection against switching loops is called:
A. UTP
B. SSH
C. STP
D. HMAC
C. STP
Disabling SSID broadcast:
A. Is one of the measures used for securing networks
B. Makes a WLAN harder to discover
C. Blocks access to WAP
D. Prevents wireless clients from accessing the network
B. Makes a WLAN harder to discover
A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is known as:
A. EMI shielding
B. Hardware lock
C. MAC filter
D. Quality of Service (QoS)
C. MAC filter
Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications?
A. LACP
B. DSCP
C. SIEM
D. LWAPP
C. SIEM
A software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network are referred to as:
A. AUP
B DLP
C. UAT
D. LTO
B. DLP (Data Loss Prevention)
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as Pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or Post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.
A. True
B. False
A. True
Which of the following tools would be used to check the contents of an IP packet?
A. Protocol analyzer
B. Secure Shell (SSH)
C. SNMP agent
D. Port scanner
A. Protocol analyzer
What is the most effective way for permanent removal of data stored on magnetic drive?
A. Quick format
B. Recycle bin
C. Degaussing
D. Low-level format
C. Degaussing
Steganography allows for:
A. Checking data integrity
B. Calculating hash values
C. Hiding data within another piece of data
D. Data encryption
C. Hiding data within another piece of data
A monitored host of network specifically designed to detect unauthorized access attempts is known as:
A. Botnet
B. Rogue access point
C. Honeypot
D. Flood guard
C. Honeypot
The practice of connecting to an open port on a remote server to gather more information about the service running on that port is referred to as:
A. Bluejacking
B. Banner grabbing
C. Session hijacking
D. eDiscovery
B. Banner grabbing
What is the name of a command-line utility used for checking the reachability of a remote host?
A. tracert
B. ping
C. nslookup
D. netstat
B. ping
Windows command-line utility for displaying intermediary points on the packet route is called:
A. ping
B. netstat
C. ipconfig
D. tracert
D. tracert