Test 10 Flashcards

1
Q

Which of the following URLs is a potential indicator of a directory traversal attack?

A

http://www.example.com/var/../etc/passwd
http://www.example.com/var/www/../../etc/passwd
http://www.example.com/var/www/files/../../../etc/passwd
http://www.example.com/var/www/files/images/../../../../etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of cryptographic attack that forces a network protocol to revert to its older, less secure version is known as:

A

Downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hash collision occurs when cryptographic hash function produces two different digests for the same data input.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cryptographic attack relies on the concepts of probability theory?

A

Birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which password attack bypasses account-lockout policies?

A

Spraying attack (

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is called:

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:

A

IoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An account lockout might indicate which type of malicious activity?

A

Password brute-forcing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the terms listed below most accurately describes a situation wherein a single account is being used from multiple locations/devices at the same time?

A

Concurrent session usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following terms refers to a malicious activity indicator in a situation where a firewall or other security measure prevents an attempt to deliver malicious payload or perform an unauthorized action?

A

Blocked content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the terms listed below most accurately describes a situation wherein an account is accessed from a location that is physically impossible for the user to be in?

A

Impossible travel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The term “Out-of-cycle logging” refers to instances where systems or applications produce logs outside their regular intervals or in abnormal volumes, potentially signaling malicious activity.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following would indicate an attempt to hide evidence of malicious activity?

A

Missing logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the terms listed below refers to a logical grouping of computers that allow computer hosts to function as if they were attached to the same broadcast domain regardless of their physical location?

A

VLAN

17
Q

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?

A

VLSM

18
Q

Which of the following provides granular control over user access to specific network segments and resources based on their assigned roles and permissions?

A

IAM

19
Q

Which of the answers listed below refers to a solution that allows for easier management and control of network segmentation policies through software applications?

A

SDN

20
Q

Which of the following acronyms refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

21
Q

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

A

ACL

22
Q

Which of the answers listed below refers to a rule-based access control mechanism associated with files and/or directories?

A

FACL

23
Q

Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?

A

Implicit deny policy

24
Q

Which of the answers listed below does not refer to the concept of network isolation?

A

DLP

25
Q

Which of the following answers does not refer to the concept of system/application isolation?

A

Data encryption (