Comptia review questions Flashcards
(247 cards)
You go out the back door of your building and notice someone looking
through your company’s trash. If this person were trying to acquire sensitive
information, what would this attack be known as?
Dumpster diving
User education can help to defend against which type of attacks?
Social engineering
You can often configure your email servers or email cloud services to add
a message in the email subject line to identify emails that are coming from
outside of the organization. This technique is also known as __________.
Prepending
What is the most common reason that social engineering succeeds?
Lack of user awareness
In which two environments would social engineering attacks be most effective?
A public building with shared office space
What is a social engineering technique used by adversaries that leverages user
errors (“typos”) when entering a given URL in their web browser for a given
website?
Typo squatting
A man pretending to be a data communications repair technician enters your
building and states that there is networking trouble and he needs access to the
server room. What is this an example of?
Social engineering
Turnstiles, double entry doors, and security guards are all preventive measures
for what kind of social engineering?
Tailgating
What is the social engineering technique where the attacker redirects the
victim from a valid website or resource to a malicious one that could be made
to appear as the valid site to the user?
Pharming
Why would you implement password masking and privacy screens/filters?
To deter shoulder surfing
What is a group of compromised computers that have software installed by a
worm or Trojan?
Botnet
What term is often used to describe a compromised system that can be
updated automatically and remotely?
Bot
What is a common symptom of spyware?
Pop-up windows with advertisements
You noticed that your DHCP server is flooded with information. After analyzing this condition, you found that the information is coming from more than
100 computers on the network. What is most likely the reason?
You have been infected with a worm
Which type of malicious software encrypts sensitive files and asks the user to
pay in order to obtain a key recover those files?
Ransomware
What is a malicious attack that executes at the same time every week?
Logic bomb
What is still one of the most common ways that attackers spread ransomware?
Through email
What is a type of malware that appears to a user as legitimate but actually
enables unauthorized access to the user’s computer?
Trojan
What tool is used by many penetration testers, attackers, and even malware
that can be useful for retrieving password hashes from memory?
Mimikatz
What is the act of restructuring driver code called?
Driver refactoring
What type of attack occurs when the attacker performs an MITM attack and
can redirect a client to an insecure HTTP connect?
SSL stripping attack
What is a modern framework of API documentation and development that is
the basis of the OpenAPI Specification (OAS)?
Swagger
What type of attack occurs when a user browsing the web is tricked into clicking something different than what the user thought he or she was clicking?
Clickjacking
What type of attack is difficult to exploit because it takes advantage of the
small window of time between when a service is used and its corresponding
security control is executed in an application, operating system, or when temporary files are created?
Race condition