Chapter 2 Flashcards

1
Q

An employee stealing company data could be an example of which kind of threat actor?

Internal threat
External threat
Non-persistent threat
Persistent threat

A

Internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the BEST definition of the term hacker?

A general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization.

The most organized, well-funded, and dangerous type of threat actor.

Any individual whose attacks are politically motivated.

A threat actor whose main goal is financial gain.

A threat actor who lacks skills and sophistication but wants to impress their friends or garner attention.

A

A general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government?

Hacktivist
Insider
Script kiddie
Nation state
Competitor

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The IT manager in your organization proposes taking steps to deflect a potential threat actor. The proposal includes the following:

Create and follow onboarding and off-boarding procedures.
Employ the principal of least privilege.
Have appropriate physical security controls in place.
Which type of threat actor do these steps guard against?

Competitor
Hacktivist
Script kiddie
Insider

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A script kiddie is a threat actor who lacks knowledge and sophistication. Script kiddie attacks often seek to exploit well-known vulnerabilities in systems.

What is the BEST defense against script kiddie attacks?

Have appropriate physical security controls in place.

Implement email filtering systems.

Keep systems up to date and use standard security practices.

Properly secure and store data backups.

Build a comprehensive security approach that uses all aspects of threat prevention and protection.

A

Keep systems up to date and use standard security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A hacker scans hundreds of IP addresses randomly on the internet until they find an exploitable target. What kind of attack is this?

Insider attack
Nation state attack
Opportunistic attack
Targeted attack

A

Opportunistic attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-Stealing Information
-Preparing a computer to perform additional tasks in the attack.
-Crashing systems.
-Gathering system hardware information.
-Penetrating system defenses to gain unauthorized access.
-Configuring additional rights to do more than breach the system.

Match the general attack strategy

Reconnaissance
Breaching
Escalating Privileges
Staging
Exploitation

A

-Exploitation
-Staging
-Exploitation
-Reconnaissance
-Breaching
-Escalating Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-The constant change in personal habits and passwords to prevent anticipated events and exploitation.

-Diversifying layers of defense.

-Giving users only the access they need to do their job and nothing more.

-Implementing multiple security measures to protect the same asset.

-Eliminating single points of failure.

-Giving groups only the access they need to do their job and nothing more.

Match the general defense strategy

Layering
Principle of least privilege
Variety
Randomness
Simplicity

A

-Randomness
-Variety
-Principle of least privilege
-Layering
-Layering
-Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the BEST example of the principle of least privilege?

Wanda has been given access to the files that she needs for her job.

Lenny has been given access to files that he does not need for his job.

Mary has been given access to all of the file servers.

Jill has been given access to all of the files on one server.

A

Wanda has been given access to the files that she needs for her job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which phase of an attack does the attacker gather information about the target?

Escalating privileges
Exploit the system
Reconnaissance
Breach the system

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A collection of zombie computers have been set up to collect personal information. Which type of malware do the zombie computers represent?

Spyware
Trojan horse
Logic bomb
Botnet

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which kind of virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions?

Remote Access Trojan (RAT)
Fileless virus
Worm
Ransomware

A

Fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following describes a logic bomb?

A program that performs a malicious activity at a specific time or after a triggering event.

A program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found.

A type of malicious code similar to a virus whose primary purpose is to duplicate itself and spread while not necessarily intentionally damaging or destroying resources.

A program that appears to be a legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously.

A

A program that performs a malicious activity at a specific time or after a triggering event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of malware that prevents the system from being used until the victim pays the attacker money is known as what?

Remote Access Trojan (RAT)
Fileless virus
Ransomware
Denial-of-service attack (DoS attack)

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which kind of malware provides an attacker with administrative control over a target computer through a backdoor?

Remote Access Trojan (RAT)
Trojan horse
Crypto-malware
Potentially Unwanted Program (PUP)

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are characteristics of a rootkit? (Select two.)

Requires administrator-level privileges for installation.

Resides below regular antivirus software detection.

Uses cookies saved on the hard drive to track user preferences.

Monitors user actions and opens pop-ups based on user preferences.

Collects various types of personal information.

A

Requires administrator-level privileges for installation.

Resides below regular antivirus software detection.

17
Q

Which of the following best describes spyware?

It is a program that attempts to damage a computer system and replicate itself to other computer systems.

It monitors user actions that denote personal preferences and then sends pop-ups and ads to the user that match their tastes.

It monitors the actions you take on your machine and sends the information back to its originating source.

It is a malicious program disguised as legitimate software.

A

It monitors the actions you take on your machine and sends the information back to its originating source.

18
Q

Which of the following is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?

Worm
Trojan horse
ActiveX control
Outlook Express

A

Trojan horse

19
Q

In 2001, a worm exploited vulnerabilities in Microsoft Internet Information Services (IIS) to infect over 250,000 systems in under nine hours. What was this worm called?

Michelangelo
Nimda
Code Red
Melissa

A

Code Red

20
Q

Ron, a hacker, wants to get access to a prestigious law firm he has been watching for a while. June, an administrative assistant at the law firm, is having lunch at the food court around the corner from her office. Ron notices that June has a picture of a dog on her phone. He casually walks by and starts a conversation about dogs. Which phase of the social engineering process is Ron in?

Exploitation phase
Research phase
Elicitation phase
Development phase

A

Development phase

21
Q

Social engineers are master manipulators. Which of the following are tactics they might use?

Moral obligation, ignorance, and threatening

Eavesdropping, ignorance, and threatening

Shoulder surfing, eavesdropping, and keylogging

Keylogging, shoulder surfing, and moral obligation

A

Moral obligation, ignorance, and threatening

22
Q

Any attack involving human interaction of some kind is referred to as what?

Social engineering
A white hat hacker
Attacker manipulation
An opportunistic attack

A

Social engineering

23
Q

An organization’s receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. The individual is engaging in which type of social engineering?

Commitment
Persuasive
Social validation
Authority

A

Authority

24
Q

Which of the following is a common social engineering attack?

Distributing false information about an organization’s financial status
Logging on with stolen credentials
Distributing hoax virus-information emails
Using a sniffer to capture network traffic

A

Distributing hoax virus-information emails

25
Q

Which of the following BEST describes an inside attacker?

An agent who uses their technical knowledge to bypass security.

A good guy who tries to help a company see their vulnerabilities.

An attacker with lots of resources and money at their disposal.

An unintentional threat actor. This is the most common threat.

A

An unintentional threat actor. This is the most common threat.

26
Q

Which of the following are examples of social engineering attacks? (Select three.)

Impersonation
War dialing
Shoulder surfing
Keylogging
Port scanning

A

Impersonation
Shoulder surfing
Keylogging

27
Q

Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique?

Impersonation
Interrogation
Elicitation
Preloading

A

Elicitation

28
Q

Having a legitimate reason for approaching someone to ask for sensitive information is called what?

Pretexting
Footprinting
Preloading
Impersonation

A

Impersonation

29
Q

Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for a name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked. How did the attacker accomplish this hack?

Social networking
Host file modification
DNS cache poisoning
Feigning ignorance

A

DNS cache poisoning

30
Q

Every ACME computer comes with the same account created at the factory. Which kind of vulnerability is this?

Backdoor
Misconfigurations
Weak passwords
Default accounts and passwords

A

Default accounts and passwords

31
Q

In healthcare, regulations often dictate that important systems remain unpatched to maintain compliance. Which kind of vulnerability does this introduce?

Weak passwords
Application flaws
Misconfigurations
Inherent vulnerabilities

A

Inherent vulnerabilities

31
Q

Which security control, if not applied, can allow an attacker to bypass other security controls?

Physical access control
Principle of least privilege
Updating firmware or software
Changing default passwords

A

Physical access control

32
Q

A user is able to access privileged administrative features with an account that is not granted administrator rights. Which type of vulnerability is this?

Weak passwords
Privilege escalation
Backdoor account
Stealing administrator credentials

A

Privilege escalation

33
Q

The root account has all privileges and no barriers. Which of the following is another name for the root account?

User account
Default account
Superuser account
Backdoor account

A

Superuser account

34
Q

A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?

Zero-day exploit
Unpatched software
Weak security configurations
Default settings

A

Weak security configurations

35
Q

Sometimes, an attacker’s goal is to prevent access to a system rather than to gain access. This form of attack is often called a denial-of-service attack and causes which impact?

Availability loss
Identity theft
Data exfiltration
Data loss

A

Availability loss

36
Q

When confidential or protected data is exposed, either intentionally or accidentally, it is considered to be which of the following?

Availability loss
Data breach
Data exfiltration
Data loss

A

Data breach

37
Q

DNS tunneling is a common method that allows an attacker to accomplish which attack?

Medical identity theft
Data loss
Availability loss
Data exfiltration

A

Data exfiltration