CompTia practice questions Flashcards
- An attacker sends a targeted email with a malicious attachment to a user in
your company. This attacker researched public information about the user to
send a “more personal” and targeted email to the user. Which of the following
is this type of attack?
a. Spear phishing
b. Typo squatting
c. Pharming
d. None of these answers are correct.
- A. Spear phishing is one of the most common social engineering attacks
where the attacker searches for public information about the victim to
send a targeted email to steal information. Typo squatting (or typosquatting) is a technique used by adversaries that leverages human error when
typing a URL in their web browser. Pharming is the term used to describe
a threat actor redirecting a victim from a valid website or resource to
a malicious one that could be made to appear as a valid site to the user.
From there, an attempt is made to extract confidential information from
the user or to install malware in the victim’s system.
2. Which of the following is an example of a tool that can be used specifically to perform social engineering attacks? a. Maltego b. SET c. The Harvester d. Recon-NG
- B. The Social Engineering Toolkit (SET) is an example of a tool that can
be used specifically to perform social engineering attacks.
- Which of the following best describes the difference between smishing and
vishing?
a. Vishing is a social engineering attack in which the attacker calls the user
over the phone and then persuades the user to reveal sensitive information or perform a given action. Smishing is a type of phishing campaign
using SMS text messages instead of email.
b. Vishing is a social engineering attack in which the attacker leaves a
voicemail and then persuades the user to reveal sensitive information or
perform a given action. Smishing is a type of typo squatting and pharming campaign using Bluetooth.
c. Vishing is a social engineering attack in which the attacker leaves a
voicemail and then persuades the user to reveal sensitive information or
perform a given action. Smishing is a type of typo squatting and pharming campaign using short Internet messaging systems.
d. None of these answers are correct.
- A. Vishing is social engineering attack in which the attacker calls the user
over the phone and then persuades the user to reveal sensitive information
or perform a given action. Smishing is a type of phishing campaign using
SMS text messages instead of email.
- A(n) ______ is a small space that can usually only fit one person, used to combat tailgating.
a. tunnel-gap
b. tunnel-trap
c. piggyback
d. access control vestibule
- D. An access control vestibule is a small space that can usually fit only one
person, used to combat tailgating. Tunnel-gap or tunnel-traps are not correct social engineering terms. Piggyback is the act of following someone
while opening a door to enter a building or a room.
Which of the following best describes pretexting?
a. Impersonation
b. Social engineering
c. Whaling
d. Pharming
A. Pretexting is the act of impersonating someone else.
Which of the following refers to the act of incorporating malicious ads on
trusted websites, which results in users’ browsers being inadvertently redirected to sites hosting malware?
a. Malvertising
b. Pharming
c. Active ad exploitation
d. Whaling
B. Pharming is a social engineering technique where an attacker incorporates malicious ads on trusted websites, which results in users’ browsers
being inadvertently redirected to sites hosting malware.
Which of the following is true about spear phishing?
a. Spear phishing attacks use the Windows Administrative Center.
b. Spear phishing attacks are phishing attempts that are constructed
in a very specific way and directly targeted to specific individuals or
companies.
c. Spear phishing, whaling, and phishing are the same type of attack.
d. Spear phishing attacks use the Windows PowerShell.
B. Spear phishing is phishing attempts that are constructed in a very specific way and directly targeted to specific individuals or companies.
Derek is the CEO of a Fortune 500 company. He received an email with a
malicious attachment. Once Derek clicked on the attachment, malware was
installed on his system. Which of the following best describes this attack?
a. Smishing
b. Vishing
c. Whaling
d. Pretexting
C. Whaling is a social engineering attack similar to phishing and spear phishing. However, in whaling attacks the attacker targets executives and key personnel of an organization (aka the “big fish”).
Which of the following is true about social engineering motivation
techniques?
a. Social proof can be used to create a feeling of urgency in a decisionmaking context. It is possible to use specific language in an interaction to
present a sense of urgency and manipulate the victim.
b. Scarcity can be used to create a feeling of urgency in a decision-making
context. It is possible to use specific language in an interaction to present
a sense of urgency and manipulate the victim.
c. Scarcity cannot be used to create a feeling of urgency in a decisionmaking context. It is possible to use specific language in an interaction to
present a sense of urgency and manipulate your victim.
d. Social proof cannot be used in an interrogation because it is illegal. It is
not legal to use specific language in an interaction to present a sense of
urgency and manipulate your victim.
B. Attackers use the social engineering scarcity technique to create a feeling of
urgency in a decision-making context. It is possible to use specific language in
an interaction to present a sense of urgency and manipulate the victim.
Which of the following recommendations can be used in user security
awareness education?
a. Adhere to the organization’s clean desk policy, which states that all documents, electronics, personally owned devices, and other items be put
away (or locked away) when the user is not at his or her desk, or other
work area.
b. Always screen your email and phone calls carefully and keep a log of
events. This is also known as communications vetting.
c. Use encryption when possible to protect emails, phone calls, and data.
d. All of these answers are correct.
D. All of the available answers can be used as recommendations for user security awareness training and education.
You logged in to your laptop and noticed a message saying that all your files
have been encrypted and to recover them you need to pay $1,000 in Bitcoins.
What has your system been infected with?
a. Ransomware
b. Worm
c. Keylogger
d. None of these answers are correct.
A. Ransomware is a type of malware that restricts access to a computer system and demands that a ransom be paid. It informs the user that in order to
decrypt the files or unlock the computer to regain access to the files, a payment would have to be made to one of several banking services (typically
crypto currencies like Bitcoin).
What type of malware can look like legitimate software but then performs
negative actions to manipulate your system?
a. Trojan
b. Ransomware
c. Worm
d. None of these answers are correct
A. Trojans appear to perform desirable functions but are actually performing
malicious functions behind the scenes.
Which malware type can allow an attacker to gain administrator privileges?
a. Keylogger
b. Rootkit
c. Ransomware
d. All of these answers are correct.
B. Rootkit is a type of malware designed to gain administrator-level control
over a computer system without being detected.
What type of malware does not reside on the hard drive of a computer?
a. Ransomware
b. Botnets
c. Fileless malware
d. None of these answers are correct.
C. Fileless malware works differently from traditional malware that puts malicious executables within the file system; instead, it works in a memory-based
environment.
Bots in a botnet typically receive instructions from which of the following?
a. A command-and-control (C2) server
b. A zombie system
c. A malvertising site
d. All of these answers are correct.
A. A group of compromised computers (bots), known as a botnet, is typically
controlled by a command-and-control (C2) server/system.
An attacker using John the Ripper, which uses a wordlist, is an example of which of the following? a. Social engineering attack b. Dictionary password attack c. Buffer overflow attack d. Cross-site request forgery attack
B. A dictionary password attack pulls words from the dictionary or word lists
to attempt to discover a user’s password. A dictionary attack uses a predefined
dictionary to look for a match between the encrypted password and the
encrypted dictionary word
An attacker using a large number of usernames with a few commonly used
passwords is considered what kind of attack?
a. Password spraying
b. Credential harvesting
c. Password cracking
d. None of these answers are correct
A. In password spraying an attacker attempts to compromise a system using a
large number of usernames with a few commonly used passwords.
What type of attack occurs when an attacker captures credit card information
or information from other similar cards (gift cards, loyalty cards, identification
cards, and so on)?
a. Skimming
b. Shimming
c. SIM cloning
d. None of these answers are correct
A. Skimming is a type of attack in which an attacker captures credit card
information or information from other similar cards (gift cards, loyalty cards,
identification cards, and so on) from a cardholder surreptitiously. Attackers use
a device called a skimmer that can be installed at strategic locations such as
ATMs and gas pumps to collect card data.
Which of the following techniques are used to attack machine learning (ML)
implementations?
a. Tainting of data to cause errors in the outcome of the ML solution
b. Overfitting attacks
c. ML transfer attacks
d. All of these answers are correct.
D. Tainting, overfitting, and transfer attacks are types of adversarial techniques
against machine learning (ML) implementations.
You purchased a brand-new Internet of Things (IoT) device and noticed that
it started collecting personal information (PI) and attempted to send your data
by communicating with random IP addresses. You noticed that an implant
could have been installed during the manufacturing of the product. What type
of attack might this be?
a. Supply-chain attack
b. Cross-site scripting
c. Return to libc attack
d. Masquerading attack
A. A supply-chain attack occurs when attackers target security weaknesses in
the supply network and install malicious software or hardware implants to perform different nefarious activities.
Which of the following attacks are made against cloud implementations?
a. API attacks
b. DNS attacks
c. VM escape attacks
d. All of these answers are correct.
D. Attackers can perform virtual machine (VM) escape, API, and DNS attacks
to compromise cloud-hosted applications and services.
An attacker attempts to force an application to roll back the version of TLS
(from TLS version 1.3 to 1.0). What is the name of this type of attack?
a. Privilege escalation
b. Downgrade attack
c. Cracking
d. Fuzzing
B. A downgrade attack is a type of cryptographic attack that forces the rollback
of a strong algorithm in favor of an older, lower-quality algorithm or mode of
operation.
What type of privilege escalation attack occurs when a user accesses functions
or content reserved for other normal users—for example, if one user reads
another’s email?
a. Horizontal
b. Vertical
c. Sudo abuse
d. None of these answers are correct.
A. The two types of privilege escalation attacks are vertical and horizontal. A horizontal privilege escalation attack occurs when a user accesses functions or content reserved for other users. Vertical privilege escalation occurs when a lower-privileged user accesses functions reserved for higher-privileged users— for example, if a standard user can access functions of an administrator. This is also known as privilege elevation and is the most common description. To protect against this type of situation, you should update the network device firmware. In the case of an operating system, it should again be updated, and use of some type of access control system is also advisable—for example, User Account Control (UAC).
Which vulnerability can lead to stealing of cookies or redirecting users to
malicious sites and where the malicious code or script is permanently stored
on a vulnerable system?
a. DOM-based XSS
b. Stored XSS
c. Reflected XSS
d. All of these answers are correct.
B. Stored, or persistent, XSS attacks occur when the malicious code or script
is permanently stored on a vulnerable or malicious server, using a database.
These attacks are typically carried out on websites hosting blog posts (comment forms), web forums, and other permanent storage methods. An example
of a stored XSS attack is a user requesting the stored information from the
vulnerable or malicious server, which causes the injection of the requested
malicious script into the victim’s browser. In this type of attack, the vulnerable
server is usually a known or trusted site.