test 4 Flashcards
An attacker is using a word list that contains 1 million possible passwords as they attempt to crack your Windows password. What type of password attack is this?
Rainbow Table
Brute-Force
Dictionary
Hybrid
Answer: Dictionary Attack
Explanation
OBJ-2.5: A dictionary attack uses a list of common passwords to crack a user’s password. These lists do not have just dictionary words, though. For example, the word Dr@g0nBr3@+h (dragon breath) may be one such word but rewritten by substituting symbols or numbers for various letters. The dictionary file might have words like DRAGON, dragon, Dr@g0n, and many other forms. Most dictionary files contain millions of entries, and the password cracking tries each one until a match is found. A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. A hybrid attack combines a dictionary list with the ability to add brute-force combinations to crack a password that is slightly different than the dictionary list entry. A rainbow table is a tool for speeding up attacks against Windows passwords by precomputing possible hashes. A rainbow table is used to authenticate users by comparing the hash value of the entered password against the one stored in the rainbow table. Using a rainbow table makes password cracking a lot faster and easier for an attacker.
A home user brought their Windows 10 laptop to the electronics store where you work. They claim their computer has become infected with malware. You begin troubleshooting the issue by first pressing the power button, and the laptop loads properly without any issues. When you open Microsoft Edge, you notice that multiple pop-ups appear almost immediately. Which of the following actions should you take NEXT?
- Quarantine the machine and report it as infected to your company’s cybersecurity department for investigation.
- Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware.
- Document the pop-ups displayed and take a screenshot
- reinstall or reimage the operating system
Answer: Clear the browser’s cookies and history, enable the pop-up blocker, and scan the system for malware.
Explanation
OBJ-3.3: Malware often targets the web browser. Malware such as adware and spyware is designed with commercial or criminal intent rather than to vandalize the computer system. Common infection symptoms of spyware or adware are pop-ups or additional toolbars, the home page or search provider changing suddenly, searches returning results that are different to other computers, slow performance, and excessive crashing. Viruses and Trojans may spawn pop-ups without the user opening the browser. Since this is a home user’s laptop, you should remediate the issue and return the system to them. Since this is not a system owned by your company, there is no reason to report it to your company’s cybersecurity department.
Which of the following types of installations would you use on a system with slow performance or one that you cannot isolate a single cause of the system’s issues?
in-place upgrade
remote network installation
image deployment
repair installation
Answer: repair installation
Explanation
OBJ-1.7: Repair installation is a type of installation that attempts to replace the existing version of the operating system files with a new copy of the same version. A repair installation is useful when trying to repair a Windows computer that will not boot or when you believe the system files have become corrupted. An image deployment is a type of installation that uses a clone of an existing installation stored in an image file to perform the installation. The image can contain the base OS and configuration settings, service packs and updates, applications software, and whatever else is required. An image can be stored on DVD or USB media or can be accessed over a network. A remote network installation connects to a shared folder containing the installation files. During the remote network installation, the target PC will boot to a Preboot eXecution Environment (PXE) and then copy the files to a temporary location on its hard drive before fully installing them to the target PC. Most commonly, a remote network installation will be combined with an image deployment for a more efficient installation across the network. An in-place upgrade is an installation of the new operating system on top of an existing version of the operating system. An in-place upgrade will preserve the applications, user settings, and data files that already exist on the computer.
Your company wants to get rid of some old paper files. The files contain PII from previous customers, including their names, birth dates, and social security numbers. Which of the following are the appropriate data destruction and disposal techniques that should be utilized for these papers?
Recycling bin
strip-cut shredder
cross-cut shredder
micro-cut shredder
Answer: micro-cut shredder
Explanation
OBJ-2.9: The three most common types are; strip-cut, cross-cut, and micro-cut. The strip-cut machines shred long vertical pieces, as cross-cut adds horizontal cuts to make the shred pieces even smaller. Micro-cut machines shred to an even higher level of security, essentially converting your documents into tiny particles.
Which type of authentication method is commonly used with physical access control systems and relies upon RFID devices embedded into a token?
smart cards
proximity cards
TOTP
HOTP
answer: proximity cards
Explanation
OBJ-2.1: A proximity card is a contactless card that usually utilizes RFID to communicate with the reader on a physical access system. These are commonly used to access secured rooms (such as server rooms) or even a building itself (such as at an access control vestibule). Some smart cards contain proximity cards within them, but the best answer to this question is proximity cards since that is the function of the smart card would be the device used to meet this scenario’s requirements. An HMAC-based one-time password (HOTP) is a one-time password algorithm based on hash-based message authentication codes. A Time-based one-time password (TOTP) is a computer algorithm that generates a one-time password that uses the current time as a source of uniqueness.
A customer’s Android smartphone is only 6 months old but is becoming excessively slow. When questioned, the customer states it was acting fine until they recently installed a new stock market tracking app. What action should you take to troubleshoot the slow performance on this phone?
- uninstall the app, reboot the phone, and reinstall the app
- replace the phone with a newer model
- perform a hard reboot of the smartphone
- Factory reset the smartphone and reinstall all the apps
Answer: uninstall the app, reboot the phone, and reinstall the app
Explanation
OBJ-3.4: The best option in this scenario is to uninstall and reinstall the stock market app. When apps are updated automatically, they can sometimes become faulty or corrupted and slow down performance on the device. With Android phones, much like iPhones, apps can run in the background and may begin to take up excess resources. If the app is removed, the phone is rebooted, and the app is reinstalled, and the issue persists, then the app should be removed, and an alternate app selected to replace it. Remember, in the CompTIA troubleshooting method we should always question the obvious. In the question, the thing that recently changed was the installing of a new app, so it is likely the issue.
When Jason needs to log in to his bank, he must use a hardware token to generate a random number code automatically synchronized to a code on the server for authentication. What type of device is Jason using to log in?
smart card
piv card
biometric lock
key fob
answer: key fob
Explanation
OBJ-2.1: A key fob is a hardware token that generates a random number code synchronized to a code on the server. The code changes every 60 seconds or so. This is an example of a one-time password. A SecureID token is an example of a key fob that is produced by RSA. A smart card, chip card, PIV card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system. A biometric lock is any lock that can be activated by biometric features, such as a fingerprint, voiceprint, or retina scan. Biometric locks make it more difficult for someone to counterfeit the key used to open the lock or a user’s account. A smart card is a form of hardware token.
Which TWO of the following would provide the BEST security for both computers and smartphones?
using a cable lock enabling multifactor authentication configuring organizational units utilizing access control lists enforcing trusted software sources enabling data loss prevention
answers:
enabling multifactor authentication
enforcing trusted software sources
Explanation
OBJ-2.2: The use of multifactor authentication is considered an industry best practice for both computers and smartphones. Additionally, any software being installed should come from a trusted source to prevent malware infections. Access controls lists can be easily set up on a computer, but not a smartphone. Data loss prevention (DLP) software can identify data that has been classified and apply fine-grained user privileges to prevent copying it or forwarding it by email and more. DLP is usually installed on a server, although there are some versions made for computers. Organizational units in Windows Active Directory are a way of dividing the domain up into different administrative realms. Cable locks are effective for laptops, but not for smartphones.
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?
- increase the wifi signal being transmitted by their WAP
- enable MAC filtering on their WAP
- Turn off wifi and rely on their cellular data plan
- upgrade to a new smartphone
answer: increase the wifi signal being transmitted by their WAP
Explanation
OBJ-3.5: Slow data speeds can be caused by too much interference or a weak signal. Try changing the channel on Wi-Fi routers to less-used channels or boost the signal being transmitted, and the performance should increase. Alternatively, if the cellular signal is too low, you can install a signal booster or microcell in the home or office. Enabling MAC filtering would block devices attempting to connect to the Wi-Fi. Turning off the Wi-Fi and using their cellular data plan might be a valid workaround, but it does not solve the issue of the Wi-Fi not functioning properly at home. Upgrading the smartphone would not increase the speed of their home Wi-Fi, as their current smartphone already operates at faster speeds on other Wi-Fi networks.
Your company has just installed a new proxy server and has asked you to configure all of the Windows workstations to use it. Which of the following Internet Options tabs in the Windows Control Panel should you configure?
connections
privacy
content
general
answer: connections
Explanation
OBJ-1.6: The Connections tab in the Internet Options is used to set up the dial-up and VPN settings and the LAN settings. Under the LAN settings, you can configure the proxy server settings for the system.
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
RADIUS
TACACS+
CHAP
KERBEROS
answer: TACACS+
Explanation
OBJ-2.3: TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco. The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it. Kerberos is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT. Challenge-Handshake Authentication Protocol (CHAP) is used to authenticate a user or network host to an authenticating entity. CHAP is an authentication protocol but does not provide authorization or accounting services.
what is TACACS+
TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco
A cybersecurity analyst is auditing your company’s network logs and identifies that a USB mass storage device was previously inserted into many of the company’s servers. The logs also showed dozens of failed login attempts before a successful login occurred on the servers. Which TWO of the following actions are recommended to eliminate the vulnerabilities identified by the cybersecurity analyst?
INSTALL A HOST BASED FIREWALL ON THE SERVERS
CHANGE THE DEFAULT CREDENTIALS ON THE SERVER
REMOVE ADMINISTRATIVE PERMISSIONS
LOCKOUT THE ACCOUNT AFTER 3 FAILED LOGIN ATTEMPTS
INSTALL THE OPERATING SYSTEM SECURITY UPDATES
MODIFY THE AUTORUN SETTINGS
answers:
LOCKOUT THE ACCOUNT AFTER 3 FAILED LOGIN ATTEMPTS
MODIFY THE AUTORUN SETTINGS
Explanation
OBJ-2.7: Since the USB mass storage device was used to connect to the servers, it is recommended to modify the AutoRun settings. To prevent the password guessing attacks used, the servers should be configured to lock out any account after 3 failed login attempts. The other options are all considered good security practices, but they do not directly address the issues presented in this scenario.
Regardless of what website Michelle types into her browser, she is being redirected to “malwarescammers.com.” What should Michelle do to fix this problem?
Reset the web browser’s proxy setting
update the anti-virus software and run a full system scan
restart the network services
rollback the application to the previous version
answer: Reset the web browser’s proxy setting
Explanation
OBJ-3.2: When a browser redirect occurs, it usually results from a malicious proxy server setting being added to the browser. Michelle should first check her web browser’s configuration for any malicious proxies under the Connections tab under Internet Options in the Control Panel. Next, she should check the hosts.ini file to ensure that single sites are not being redirected.
Upon booting up a Windows 10 machine, you see an error message stating, “One or more services failed to start.” Which of the following actions should you take?
disable application startup
verify that disabling one service has not affected others
check the configuration of antivirus software
uninstall and reinstall the service
answer: verify that disabling one service has not affected others
Explanation
OBJ-3.1: If you see a message such as “One or more services failed to start” during the Windows load sequence, check Event Viewer and/or the Services snap-in to identify which service has failed. Troubleshooting services can be complex. Of the options presented in this question, only the one for verifying that disabling one service has not affected others would help correct a service that fails to start. This is because some services depend on other services to run, so if something or someone has disabled one service, it could have inadvertently affected others.