Test 1 Flashcards

1
Q

Edie downloaded a game for her phone from the Google store. Bundled with the legitimate looking game, a separate piece of malware was also installed at the same time which uses her phone to mine cryptocurrency. Which of the following types of malware was secretly installed without her knowledge?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Match the following attacker types to their appropriate definitions.

Question
Script Kiddies

Hactivists

Nation State Actors

Insiders

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an attacker calls a target on the phone and pretends to be someone in authority, this is referred most specifically to as…

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following attacker types is associated with attacks referred to as Advanced Persistent Threats (APTs)?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an asymmetric algorithm?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Match the malware types below to their appropriate definitions.

Question
Ransomware

Virus

Worm

Logic Bomb

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following security tools is able to capture network packets and read unencrypted traffic?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The only people that should have access to Alice’s private key are Alice and Bob.

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered a bootable Linux operating system which comes pre-installed with a number of cyber security utilities such as Nmap, Wireshark and Metasploit?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following sites is MOST likely to be used in performing OSINT against a target organization in order to find out more information about the organization’s employees?

A

Linkedin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When viewing a Linux system’s encrypted password hash file, a value of $5$ indicates that the password is encrypted with SHA2. How long is the hash length for the password hashes in the Linux /etc/shadow file?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Match the following risk assessment terms with their appropriate definitions.

Question
Asset

Risk

Threat vector

Threat

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the Critical Security Controls would be essential in the event a company suffers from a ransomware attack?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are considered hashing protocols? (pick all that apply)

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital certificates are used to generate which of the following in order to perform asymmetric encryption?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following could be used to spread malware?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following types of malware most specifically pops up advertisements, malicious and/or non-malicious, on a target’s screen?

A

Adware

18
Q

Match the below cryptography terms to their most appropriate definitions.

Question
Hashing Algorithm

Symmetric Algorithm

Asymmetric Algorithm

Caesar Algorithm

A

a

19
Q

Which of the following is the term used to refer to unencrypted text when discussing cryptography?

A

a

20
Q

As a publicly traded organization within the United States, your company must adhere to which compliance regulation?

A

a

21
Q

Malware researchers have determined that the Dawgs malware was created several months ago, but only recently discovered in the wild by an independent malware researcher. The malware spreads via phishing and installs malicious browser extensions in order to steal bank account credentials. It is not believed to be a tool for the governments such as North Korea to raise funds.

What type of group is more than likely responsible for the Dawgs malware?

A

Organized crime

22
Q

Which of the following malware payloads most specifically records every key an infected user presses on their keyboard?

A

key logger

23
Q

Which of the following is the most popular method for attackers to gain access to an organization’s internal network?

A

a

24
Q

The hash length of MD5 is 128 bits.

A

True

25
Q

A network administrator for LMI Solutions, LLC, has discovered that their network switches are considered older and are no longer supported by the vendor. As such, no new firmware updates or security patches will be made for the devices. The company’s management team has decided it cannot afford to replace the networking equipment at this time.

If a company decides to do nothing to address an identified cyber security risk, such as purchasing cyber insurance to reimburse them in the event of a security breach or fixing the actual issue, this is referred most accurately to as…

A

Risk Acceptance

26
Q

In Defense-in-Depth, a company can deploy a firewall to segregate its own network from the rest of the Internet and not have to do anything else in order to secure the environment.

A

False

27
Q

Which of the following is a term used to describe a security research which conducts security attacks against web applications on the Internet with permission from the application owner?

A

White Hat

28
Q

In order to protect its most critical asset, a company has decided to encrypt the proprietary information of its clients as well as the personal information of each of its employees. By choosing to encrypt sensitive information, the company has most specifically enforced which of the aspects of Cyber Security?

A

Confidentiality

29
Q

Match the social engineering attacks below with their appropriate definitions.

Question
Shoulder Surfing

Phishing

Dumpster Diving

Piggybacking

A

a

30
Q

A security issue that an attacker could exploit to have a negative impact on an organization is referred to as?

A

a

31
Q

Which of the following cryptographic functions encrypts and decrypts data using a single key?

A

a

32
Q

Which of the following phases of the penetration testing process includes conducting reconnaissance using open source intelligence (OSINT) tools, running network scans to identify live hosts and launching exploits to take advantage of any vulnerabilities which are discovered?

A

a

33
Q

When Alice sends an encrypted file to Bob so that only Bob can decrypt the file, Alice will encrypt the file using?

A

a

34
Q

Joseph Waterman is the IT Manager at Chocolli Engineering and has been asked by his senior leadership to implement an Information Security Management Program for the company. To help get started, he has chosen to base their ISMP off of the Critical Security Controls. According to the Critical Security Controls, which security control will have the least impact in securing an organization and would be the last for Joseph to implement?

A

Penetration tests

35
Q

Which of the following cryptographic techniques is used to protect passwords?

A

Hashing

36
Q

Which aspect of cyber security would be implemented if you needed to ensure that someone performed a specific action on the company network?

A

Non-repudiation

37
Q

Jennifer wants to upload a file to a server on the Internet, but wants to ensure that the network traffic is encrypted for security purposes. Which of the following application protocols is encrypted and would be appropriate for her to use?

A

HTTPS

38
Q

An attacker is able to infect one of your company’s Windows workstations with malware. Through further analysis, it is determined that this malware used built in Powershell commands to attack other hosts on the network and steal sensitive data while providing the attacker with complete administrator access to the system. What type of malware would this specifically be referred to as?

Choose the most appropriate answer.

A

rootkit

39
Q

A malicious party that has control over millions of infected computers at one time is referred to as a…?

A

bot herder

40
Q

Availability is the most overlooked aspect of C-I-A in organizations today.

A

True