Domain 2, Quiz 2 Flashcards

1
Q

Which of the following is a vulnerability related to web-based applications where malicious scripts are injected into trusted websites?

a. Malicious update
b. Virtual machine (VM) escape
c. Cross-site scripting (XSS)
d. Firmware vulnerability

A

Cross-site scripting (XSS)

XSS is a web-based vulnerability where malicious scripts are injected into trusted websites and executed in a user’s browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A mobile device vulnerability allowing unofficial apps to be installed outside the official app store is known as?

a. Firmware vulnerability
b. VM escape
c. Sideloading
d. Jailbreaking

A

Sideloading

Sideloading is the process of installing apps on a mobile device without using the official app store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company discovered that an attacker used multiple compromised systems to flood their website’s server with traffic. This is an example of:

a. Virus attack
b. Logic bomb
c. Distributed denial-of-service (DDoS) attack
d. Trojan attack

A

Distributed denial-of-service (DDoS) attack

A DDoS attack uses multiple compromised systems to flood a target system with traffic, causing service interruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following indicates a password attack where multiple password attempts are made using various usernames?

a. Brute force
b. Collision
c. Spraying
d. Buffer overflow

A

Spraying

Spraying attacks try a few commonly used passwords against many usernames to avoid account lockouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Indicators of malicious activity might include all of the following EXCEPT:

a. Blocked content
b. Patching frequency
c. Concurrent session usage
d. Impossible travel

A

Patching frequency

Patching frequency is a maintenance task, not necessarily an indicator of malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To prevent unauthorized devices from accessing certain parts of the network, an administrator should implement:

a. Patching
b. Monitoring
c. Segmentation
d. Decommissioning

A

Segmentation

Segmentation divides a network into different segments, often using firewalls, to control access and improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which mitigation technique specifically involves creating a list of approved software that is allowed to run on a system?

a. Configuration enforcement
b. Hardening techniques
c. Application allow list
d. Least privilege

A

Application allow list

An application allow list involves creating a list of approved software permitted to run on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After obtaining a new router, a network administrator should ensure that ____ to enhance its security.

a.All unnecessary software is installed
b. It is placed in a demilitarized zone (DMZ)
c. All ports are open
d.The default password is changed

A

The default password is changed

Changing the default password is crucial because attackers often know manufacturers’ default credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that hides its presence by taking control of OS processes at a deep level is known as:

a. Spyware
b. Logic bomb
c. Rootkit
d. Worm

A

Rootkit

Rootkits take control at the OS level, often hiding their existence and activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following describes a vulnerability in an application where two processes access a shared resource concurrently, resulting in undesirable outcomes?

a. Race conditions
b. Structured Query Language injection (SQLi)
c. Firmware vulnerability
d. Malicious update

A

Race conditions

Race conditions occur when two processes access a shared resource concurrently, leading to unpredictable outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A newly discovered vulnerability that does not yet have a patch available is known as a:

a. Zero-day
b. Legacy vulnerability
c. Malicious update
d. Firmware vulnerability

A

Zero-day

Zero-day vulnerabilities are newly discovered vulnerabilities that do not yet have a patch available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an attacker tries to create a cryptographic hash collision, they are attempting to:

a. Exploit a vulnerability in a cipher’s key generation
b. Execute a downgrade attack on a secured communication
c. Decrypt ciphertext without the key
d. Find two different inputs that produce the same hash output

A

Find two different inputs that produce the same hash output

A collision attack attempts to find two distinct data sets that produce the same hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which mitigation technique involves ensuring that a user or process can only access resources essential for their legitimate purposes?

a. Segmentation
b. Hardening techniques
c. Patching
d. Least privilege

A

Least privilege

The principle of least privilege ensures users or processes have only the permissions they need to perform their tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is an attack where the attacker tries to determine or guess the password of a system by trying all possible combinations?

a. Collision
b. Replay attack
c. Brute force
d. Spraying

A

Brute force

A brute force attack involves trying all possible combinations to guess a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To ensure that only specific IP addresses can access a certain network resource, an administrator should implement:

a. Hardening techniques
b. Encryption
c. Access control list (ACL)
d. Monitoring

A

Access control list (ACL)

An ACL specifies which users or IP addresses can access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly