Threats, Attacks, Vulnerabilities Flashcards
You have noticed some unusual network traffic outbound from a certain host. The host is communicating with a known malicious server over port 443 using an encrypted TLS tunnel. You ran a full system anti-virus scan of the host with an updated anti-virus signature file, but the anti-virus did not find any infection signs. Which of the following has MOST likely occurred?
Zero-day attack
Directory traversal
session hijacking
password spraying
Zero-day attack
The management at Steven’s work is concerned about rogue devices being attached to the network. Which of the following solutions would quickly provide the most accurate information that Steve could use to identify rogue devices on a wired network?
A physical survey
Router and switch-based MAC address reporting
A discovery scan using a port scanner
Reviewing a central administration tool like an endpoint manager
A discovery scan using a port scanner
Which of the following types of attacks are usually used as part of an on-path attack?
DDOS
Tailgating
Spoofing
Brute force
Spoofing
White Team
The white team acts as the judges, enforces the rules of the exercise, observes the exercise, scores teams, resolves any problems that may arise, handles all requests for information or questions, and ensures that the competition runs fairly and does not cause operational problems for the defender’s mission
Purple Team
The purple team is made up of both the blue and red teams to work together to maximize their cyber capabilities through continuous feedback and knowledge transfer between attackers and defenders
What kind of attack is an example of IP spoofing?
On-path attack
SQL injections
Cross-site scripting
ARP poisoning
On-path attack
Several users have contacted the help desk to report that they received an email from a well-known bank stating that their accounts have been compromised and they need to “click here” to reset their banking password. Some of these users are not even customers of this particular bank, though. Which of the following social engineering principles is being utilized as a part of this phishing campaign?
Familiarity
Urgency
Consensus
Intimidation
Familiarity
A salesperson’s laptop has become unresponsive after attempting to open a PDF in their email. A cybersecurity analyst reviews the IDS and anti-virus software for any alerts or unusual behavior but finds nothing suspicious. Which of the following threats would BEST classify this scenario?
Ping of death
RAT
Zero-day malware
PII exfiltration
Zero-day malware
Which of the following is a common attack model of an APT attack?
Relies on worms to spread laterally
Involves sophisticated DDoS attacks
Holds an organization’s data hostage using encryption
Quietly gathers information from compromised systems
Quietly gathers information from compromised systems
You just received a notification that your company’s email servers have been blocklisted due to reports of spam originating from your domain. What information do you need to start investigating the source of the spam emails?
Network flows for the DMZ containing the email servers
The full email header from one of the spam messages
Firewall logs showing the SMTP connections
The SMTP audit log from his company’s email server
The full email header from one of the spam messages
You are investigating a suspected compromise. You have noticed several files that you don’t recognize. How can you quickly and effectively check if the files have been infected with malware?
Scan the files using a local anti-virus/anti-malware engine
Run the Strings tool against each file to identify common malware identifiers
Disassemble the files and conduct static analysis on them using IDA Pro
Submit the files to an open-source intelligence provider like VirusTotal
Submit the files to an open-source intelligence provider like VirusTotal
Your intrusion detection system has produced an alert based on its review of a series of network packets. After analysis, it is determined that the network packets did not contain any malicious activity. How should you classify this alert?
False negative
True negative
True positive
False positive
False positive
A cybersecurity analyst is working at a college that wants to increase its network’s security by implementing vulnerability scans of centrally managed workstations, student laptops, and faculty laptops. Any proposed solution must scale up and down as new students and faculty use the network. Additionally, the analyst wants to minimize the number of false positives to ensure accuracy in their results. The chosen solution must also be centrally managed through an enterprise console. Which of the following scanning topologies would be BEST able to meet these requirements?
Combination of cloud-based and server-based scanning engines
Passive scanning engine located at the core of the network infrastructure
Combination of server-based and agent-based scanning engines
Active scanning engine installed on the enterprise console
Active scanning engine installed on the enterprise console
You have been asked to determine if Dion Training’s web server is vulnerable to a recently discovered attack on an older version of SSH. Which technique should you use to determine the current version of SSH running on their web server?
Vulnerability scan
Passive scan
Protocol analysis
Banner grabbing
Banner grabbing
Which of the following is a best practice that should be followed when scheduling vulnerability scans of an organization’s data center?
Schedule scans to be conducted evenly throughout the day
Schedule scans to run during periods of low activity
Schedule scans to begin at the same time every day
Schedule scans to run during peak times to simulate performance under load
Schedule scans to run during periods of low activity
As a cybersecurity analyst conducting vulnerability scans, you have just completed your first scan of an enterprise network comprising over 10,000 workstations. As you examine your findings, you note that you have less than 1 critical finding per 100 workstations. Which of the following statement does BEST explain these results?
The network has an exceptionally strong security posture
The scanner was not compatible with the devices on your network
An uncredentialled scan of the network was performed
The scanner failed to connect with the majority of workstations
An uncredentialled scan of the network was performed
A customer brought in a computer that has been infected with a virus. Since the infection, the computer began redirecting all three of the system’s web browsers to a series of malicious websites whenever a valid website is requested. You quarantined the system, disabled the system restore, and then perform the remediation to remove the malware. You have scanned the machine with several anti-virus and anti-malware programs and determined it is now cleaned of all malware. You attempt to test the web browsers again, but a small number of valid websites are still being redirected to a malicious website. Luckily, the updated anti-virus you installed blocked any new malware from infecting the system. Which of the following actions should you perform NEXT to fix the redirection issue with the browsers?
Perform a System Restore to an earlier date before the infection
Reformat the system and reinstall the OS
Verify the hosts file has not been maliciously modified
Install a secondary anti-malware solution on the system
Verify the hosts file has not been maliciously modified
Which of the following would NOT be useful in defending against a zero-day threat?
Patching
Segmentation
Allow listing
Threat intelligence
Patching
What type of malware changes its binary pattern in its code on specific dates or times to avoid detection by antimalware software?
Trojan
Logic bomb
Polymorphic virus
Ransomware
Polymorphic virus
During your annual cybersecurity awareness training in your company, the instructor states that employees should be careful about what information they post on social media. According to the instructor, if you post too much personal information on social media, such as your name, birthday, hometown, and other personal details, it is much easier for an attacker to conduct which type of attack to break your passwords?
Cognitive password attack
Rainbow table attack
Birthday attack
Brute force attack
Cognitive password attack
Alexa is an analyst for a large bank that has offices in multiple states. She wants to create an alert to detect if an employee from one bank office logs into a workstation located at an office in another state. What type of detection and analysis is Alexa configuring?
Heuristic
Trend
Anomaly
Behavior
Behavior
You are trying to find a rogue device on your wired network. Which of the following options would NOT help find the device?
Site Surveys
War Walking
Port Scanning
Mac Validation
War Walking
An employee contacts the service desk because they cannot open an attachment they receive in their email. The service desk agent conducts a screen-sharing session with the user and investigates the issue. The agent notices that the attached file is named Invoice1043.pdf, and a black pop-up window appears and then disappears quickly when the attachment was double-clicked. Which of the following is most likely causing this issue?
The user doesn’t have a PDF reader installed on their computer
The email is a form of spam and should be deleted
The file contains an embedded link to a malicious website
The attachment is using a double file extension to mask its identity
The attachment is using a double file extension to mask its identity
You are performing a web application security test, notice that the site is dynamic, and must be using a back-end database. You decide you want to determine if the site is susceptible to an SQL injection. What is the first character that you should attempt to use in breaking a valid SQL request?
Exclamation mark
Double quote
Single quote
Semicolon
Single quote
Ted, a file server administrator at Dion Training, has noticed that many sensitive files have been transferred from a corporate workstation to an IP address outside of the local area network. Ted looks up the IP address and determines that it is located in a foreign country. Ted contacts his company’s security analyst, verifying that the workstation’s anti-malware solution is up-to-date and the network’s firewall is properly configured. What type of attack most likely occurred to allow the exfiltration of the files from the workstation?
Session Hijacking
MAC Spoofing
Zero-day
Impersonation
Zero-day
A penetration tester is using a known vulnerability to compromise an Apache webserver. After they gain access to the webserver, what is their next step to pivot to a protected system outside of the screened subnet?
Vulnerability scanning
Patching
Installing additional tools
Privilege escalation
Privilege escalation
A recent vulnerability scan found several vulnerabilities on an organization’s public-facing IP addresses. To reduce the risk of a breach, which of the following vulnerabilities should be prioritized for remediation?
A buffer overflow that is known to allow remote code execution
An HTTP response that reveals an internal IP address
A website utilizing a self-signed SSL certificate
A cryptographically weak encryption cipher
A buffer overflow that is known to allow remote code execution
During a penetration test, you find a hash value related to malware associated with an APT. What best describes what you have found?
SQL injection
Indicator of compromise
XSRF
Botnet
Indicator of compromise
A cybersecurity analyst has received an alert that sensors continuously observe well-known call home messages at their network boundary. Still, the organization’s proxy firewall is properly configured to successfully drop the messages before leaving the network. Which of the following is MOST likely the cause of the call home messages being sent?
An infected workstation is attempting to reach a command and control server
An attacker is performing reconnaissance of the organization’s workstation
An infected workstation is attempting to reach a command and control server
Your smartphone begins to receive unsolicited messages while eating lunch at the restaurant across the street from your office. What might cause this to occur?
Geotagging
Packet sniffing
Bluesnarfing
Bluejacking
Bluejacking
Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization’s database?
Buffer Overflow
Cross-site scripting
Denial of Service
SQL Injection
SQL Injection