comptia Flashcards

(66 cards)

1
Q

Vishing

A

Social engineering over telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

Fraud Attack to obtain information, e.g through email prompting users to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Watering hole attack

A

infecting websites a group of people access to obtain specific information, targeted attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

scarcity

A

business choices to manage the availability of resources to meet human needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

bluesnarfing

A

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS Attack

A

denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

  • Ping of death
  • buffer overflow
  • IP Spoofing
  • consumes bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A sacrificial server on a network to gather

information about intruders. What is this called?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A policy that only allows compliant devices to join their network.

A

Quarantine Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of firewall inspects packets to identify VALID communications?

A

Stateful Inspection Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All viruses are malware - TRUE?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

acronym which describes the duration after which an organisation’s viability
will be permanently threatened, if product and service delivery CANNOT be
resumed?

A

MTPOD (Maximum tolerable period of disruption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device

A

MTTR (mean-time to repair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity

A

RPO (Recovery Point Objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.

A

RTO (Recovery Time Objective)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol can automatically provide the IP address, subnet mask, default
gateway IP and DNS server IP to a client on a data network?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which feature prevents infected files being installed on a device?

A

Driver Signature Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is used to encrypt files on Microsoft

A

EFS (Encryption file system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A network engineer monitors a firewall and notices several suspicious packets have
been dropped. What is in place on the firewall?

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

security protocol and is also one of the

secure encryption systems used in data communication?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which type of tool is used to find modems on networks to initiate an attack from?

A

War-Dialler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIDS

A

Network - Intrusion Detection System
Short for network intrusion detection system, NIDS is a system that attempts to detect hacking activities, denial of service attacks or port scans on a computer network or a computer itself. … The NIDS can monitor incoming, outgoing, and local traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NTFS

A

journaling file system developed by Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

alters the communications between two parties who believe that they are directly communicating with each other.

A

MITM Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
MITM attack
26
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as
Buffer Overflow
27
is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.
Cross-site request forgery (CSRF/XSRF)
28
Which type of attack allows for tricking a user into sending unauthorized commands to a web application?
(CSRF/XSRF)
29
3 privilege escalation attacks?
- System/application vulnerability - Social engineering techniques - System/application misconfiguration
30
a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.
ARP spoofing or ARP poisoning
31
Which of the attack types listed below relies on the amplification effect?
DDOS attack
32
a computer security exploit that takes advantage of vulnerabilities in a user's web browser application?
MITB
33
A technique that allows an attacker to authenticate to a remote server without extracting a cleartext password from the digest and use the digest instead of a password credential is known as:
Pass The hash
34
In a session hijacking attack, a hacker takes advantage of the session ID stored in:
Cookie
35
A situation in which an application writes to an area of memory that it is not supposed to access is referred to as:
Buffer Overflow
36
Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?
Integer Overflow
37
an application fails to properly release memory allocated to it or continually requests more memory than it needs
Memory Leak
38
The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks. True or False?
True
39
precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources
DLL (Dynamic-link library)
40
Which of the following terms describes an attempt to read a variable that stores a null value?
Pointer Deference
41
Which of the terms listed below describes a type of attack that relies on executing a library of code?
DLL Injection
42
True or False, System sprawl is used to describe one of the aspects of poor asset management process.
True
43
Which of the following violates the principle of least privilege?
Improperly Configured Accounts
44
Resource exhaustion is considered successful in which attack?
DoS attack
45
After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:
Improper error Handling
46
Ports 20/21
FTP
47
Port 22
SSH
48
Port 25?
SMTP
49
Port 53
DNS
50
POP2 / POP3 Ports?
109/110
51
SFTP port
115
52
Port 123
NTP
53
IMAP ver3 port?
220
54
Port 23
Telnet
55
HTTP port?
Port 80
56
TFTP port?
Port 69
57
SNMP port?
Port 161
58
LDAP port?
Port 389
59
HTTPS port?
443
60
DHCP port?
67
61
A malfunction in preprogrammed sequential access to a shared resource is described as
Race Condition
62
Backdoor
Using tools to examine the internal operations of a program
63
Which type of attack denies authorised users access to network resources?
DoS
64
Which Type of attack uses more than one computer to attack the victims
DDos Attack
65
An alert signals you that a server in your network has a program running on it that bypasses authorisation . Which type of attack has occurred
Backdoor
66
You’ve discovered an expired certificate is being used repeatedly to gain logon privileges. What type of attack is this?
Replay Attack