test Flashcards
Analyze the following scenarios and determine which attacker used piggy backing.
A)On the way to a meeting in a restricted area of a government facility, a contractor holds open a gate for a person in a military uniform, who approaches the entry point at a jog, flashing a badge just outside of the readable range.
B)A government employee is late for a meeting in a restricted area of a military installation. Preoccupied with making the meeting on time, the employee does not notice when the gate has not closed and someone enters the restricted area.
C)An employee leaves the workstation to use the restroom. A coworker notices that the employee has forgotten to lock the workstation, and takes advantage of the user’s permissions.
D)Several prospective interns are touring the operations floor of a large tech firm. One of them seems to be paying especially close attention to the employees.
A
What type of phishing attack targets upper-level management?
Pharming
Credential harvesting
Whaling
Typosquatting
Whaling
A dissatisfied employee has discreetly begun exfiltrating company secrets to sell to a competitor. The employee sets up a malware script that will run in the event of the employee’s firing and account deletion. Analyze the attack and determine what type of attack the employee has emplaced.
- Rootkit
- Logic bomb
- Remote Access Trojan (RAT)
- Backdoor
Logic Bomb
Question
A hacker gains access to a database of usernames for a target company and then begins combining common, weak passwords with each username to attempt authentication. The hacker conducts what type of attack?
- Password spraying
- Brute force attack
- Dictionary attack
- Rainbow table attack
Password spraying - Password spraying is a horizontal brute-force online attack. An attacker chooses common passwords and tries them with multiple usernames.
A retail establishment experiences an attack where whole number values have been exploited. As a result, some credit values are manipulated from positive values to negative values. Which type of attack is the establishment dealing with?
- Integer overflow
- Buffer overflow
- Stack overflow
- Race condition
Integer overflow - An integer overflow attack causes the target software to calculate a value that exceeds these bounds. This may cause a positive number to become negative.
A user at a realtor’s office contacts their IT department to report that they are not able to copy contract files to a USB flash drive to take home. Which explanation does the IT representative share with the user?
- Data loss prevention prevents file copying.
- Mobile device management restricts the use of a portable USB device.
- A compromised private key has created a trust issue.
- The file copy process has been allow-listed.
Data loss prevention (DLP) performs a copy protection function based on policies. It does not govern file access, but it mediates the copying of certain tagged data to restrict it to authorized media and services.
Question
An unauthorized person gains access to a restricted area by blending in with a crowd of employee’s as they approach the security desk and show their badges to the guard. While walking down a long hallway, the group is stopped at a turnstile and the unauthorized person is discovered. What type of policy prevented this type of social engineering attack?
- CCTV policy
- Mantrap policy
- ID badge policy
- Skimming policy
Mantrap Policy
Question
Users at a company report that web browsing to their own website is not working. Upon further investigation, it is found that HTTP sessions are being hijacked. Any requests to replace a resource during a TCP connection are being altered. Which HTTP method is not working properly?
- GET
- PUT
- DELETE
- POST
PUT The PUT method creates a new resource or replaces a current resource (at a target URL) on a web server.
Question
An attack at a company renders a network useless after a switch is impacted. Engineers review network traffic and determine that the switch is behaving like a hub. What do the engineers conclude is happening? (Select all that apply.)
- The switch’s memory is exhausted.
- The switch is flooding unicast traffic.
- The switch MAC table has invalid entries.
- The switch is using MAC-based forwarding.
A/B/
MAC flooding is used to attack a switch. The intention of the attack is to exhaust the memory used to store the switch’s MAC address table.
Overwhelming the switch’s MAC table can cause the switch to stop trying to apply MAC-based forwarding and flood unicast traffic out of all ports
Question
After several users call to report dropped network connections on a local wireless network, a security analyst scans network logs and discovers that multiple unauthorized devices were connecting to the network and overwhelming it via a smartphone tethered to the network, which provided a backdoor for unauthorized access. How would this device be classified?
- A switched port analyzer (SPAN)/mirror port
- A spectrum analyzer
- A rogue access point (AP)
- A thin wireless access point (WAP)
Rouge accès point -A malicious user can set up an unauthorized (rogue) access point with something as basic as a smartphone with tethering capabilities, and non-malicious users could do so by accident.
A hacker places a false name:IP address mapping in an operating system’s HOSTS file, redirecting traffic from a legitimate IP address to a malicious IP address. What type of attack did the hacker perform?
- Domain hijacking
- Domain name system client cache (DNS) poisoning
- Rogue dynamic host configuration protocol (DHCP)
- Address Resolution Protocol (ARP) poisoning
DNS Poisoning
IT staff reviews security alerts received for a monitoring system and discovers that uncommon firewall ports on several Windows workstations and a server have been opened and are being accessed by a malicious process. What does the staff determine the issue to be?
- Shellcode
- Persistence
- Credential dumping
- Lateral movement
With lateral movement, the attacker might be seeking data assets or may try to widen access through systems by changing the system security configuration.
A security analytics team is threat hunting on a Windows network. What type of activity is most likely to alert the team to an insider attack?
- A user without privileged access executes PowerShell Invoke-Command cmdlet.
- A privileged user account executes PowerShell Invoke-Command cmdlet.
- A user without privileged access uses a Bash command whoami to locate users on the local network.
- A privileged user account uses Constrained Language Mode (CLM) and signed scripts.
Lateral movement or an insider attack uses access to execute a process remotely, using a tool such as psexec or PowerShell. These commands can blend in with ordinary network operations, though they could be anomalous behavior for a non-privileged account. Cmdlets, such as Invoke-Expression, can indicate an attempt to run some type of binary shellcode.
Which statement describes a key distinction between an intentional and unintentional threat actor?
- An intentional threat actor attacks a target from inside its network; whereas, an unintentional threat actor conducts opportunistic attacks.
- An intentional threat actor has intent and motivation to attack; whereas, an unintentional threat actor acts out of negligence.
- An intentional threat actor actively undermines a target system; whereas an unintentional threat actor passively undermines the target system.
- An intentional threat actor has permissions on the target system; whereas, an unintentional threat actor does not have permissions.
2:
Analyze the following scenarios and determine which constitutes an external threat.
- Naomi practices poor password management, and through her negligence, an outsider gains access to her company’s server.
- Raul, a security contractor, installs antivirus software for a small company. He uses his temporary access to gain the company’s banking information.
- Abram uses a quiz on a popular social media platform to solicit answers to online banking consumers’ login security questions.
- Chelsea uses her coworker’s unattended workstation to exploit her coworker’s elevated account permissions.
C /
An external actor may perpetuate an attack remotely or on-premises. The threat actor, rather than the attack method, is defined as external.
An unintentional or inadvertent insider threat is a vector for an external actor or a separate—malicious—internal actor to exploit, rather than a threat actor in its own right.
An external actor has to break into the system without having any legitimate permission. An insider threat actor has some sort of access.
A malicious insider is a current or former employee, contractor, or business partner with authorized access who exceeds permissions or misuses an organization’s network, system, or data to negatively affect the organization’s information or information systems.
An engineer routinely provides data to a source that compiles threat intelligence information. The engineer focuses on behavioral threat research. Which information does the engineer provide?
- IP addresses associated with malicious behavior
- Descriptions of example attacks
- Correlation of events observed with known actor indicators
- Data available as a paid subscription
B.
Behavioral threat research is narrative commentary describing examples of attacks and TTPs gathered through primary research sources.
Question
Sal, an IT specialist for a large tech firm, pays for a subscription to a threat data feed to stay updated on the latest blogs, white papers, and webinars in his field. What term(s) best describes this type of feed? (Select all that apply.)
- Closed
- Proprietary
- Open source
- Vendor-specific
A/B
Closed or proprietary research and cyber threat intelligence (CTI) data are available through a paid subscription to a commercial threat intelligence platform.
Closed/proprietary security solution providers also publish blogs, white papers, and webinars, making the most valuable research available early to platform subscribers.
Question
Evaluate which of the following solutions would most effectively mitigate vulnerabilities that might arise when outsourcing code development.
- Have one vendor develop the code, and a different vendor perform vulnerability and penetration testing.
- Outsource coding to multiple vendors at once, compare the results each vendor produces, and select the most secure implementations.
- Outsource all coding to a single vendor, limiting the number of vendors in the workflow.
- Trust system integration to the third-party contractor and their contacts.
A)
A solution to outsourced code development is to use one vendor for development and a different vendor for vulnerability and penetration testing.
Question
A security team uses passive scanning to gather information and data related to a suspected rogue system on a network. By using passive scanning, what type of information does the team gather?
- Credentialed
- Indirect evidence
- Embedded
- Report
B) Non-intrusive (or passive) scanning means analyzing indirect evidence, such as the types of traffic generated by a device.
An organization hires a pen tester. The tester achieves a connection to a perimeter server. Which technique allows the tester to bypass a network boundary from this advantage?
- Persistence
- Privilege escalation
- Pivoting
- Lateral movement
C) Pivoting
If the pen tester achieves a foothold on a perimeter server, a pivot allows them to bypass a network boundary and compromise servers on an inside network.
A server administrator configures digital signatures for secure communications. By doing so, the administrator accomplishes which secure method of communication? (Select all that apply.)
- Configuring encryption so no two hashes are the same
- Combining public key cryptography with hashing algorithms
- Using the same secret key to perform both encryption and decryption
- Providing authentication, integrity, and non-repudiation
B/D
A banking institution is considering the use of cloud computing across multiple locations. Comparing the various cloud deployment models, which model will likely allow optimal control over privacy and security?
- Public
- Hosted private
- Private
- Community
C)
Private cloud infrastructure is completely private to and owned by the organization, allowing greater control over privacy and security. This method suits banking and governmental services that require strict access control in their operations.
Question
Consider an abstract model of network functions for an infrastructure as code (IaC) implementation and determine which plane describes how traffic is prioritized.
- Data
- Management
- Control
- Application
C) Control
The control plane makes decisions about how traffic should be prioritized, secured, and switched. A software-defined networking (SDN) application can be used to define policy decisions.
Simulate the installation of a bare metal virtual platform.
- A type 1 hypervisor is installed directly onto a host machine and manages access to the host hardware directly.
- An office has all desktop computers replaced with low specification and low power thin client computers that boot a minimal operating system.
- The client accesses an application hosted on a server or streams the application from the server to the client for local processing.
- A client enforces resource separation at the operating system level without a hypervisor.
A)
A bare metal virtual platform means that a type 1 hypervisor is installed directly onto a host machine and manages access to the host hardware directly without going through a host Operating System (OS) like Windows Server.