CompTIA Security+ Practcie Test Flashcards
(90 cards)
Which type of attack involves flooding a target system with traffic to exhaust resources and bandwidth, rendering the system unresponsive?
A. Phishing attack
B. SQL injection
C. Man-in-the-middle attack
D. Distributed Denial of Service (DDoS)
D. Distributed Denial of Service (DDoS)
Correct answer: D. Explanation: A Distributed Denial of Service (DDoS) attack involves overwhelming a target system, server, or network with a flood of Internet traffic, thereby exhausting its resources and bandwidth. This results in the system becoming unresponsive to legitimate traffic.
In the context of cybersecurity, what is ‘social engineering’?
A. Physically breaking into a secure area
B. Using technical skills to breach defenses
C. Manipulating individuals into revealing confidential information
D. Writing malware to exploit system vulnerabilities
C. Manipulating individuals into revealing confidential information
Correct answer: C. Explanation: Social engineering in cybersecurity refers to the psychological manipulation of people into performing actions or divulging confidential information. It’s a type of confidence trick for the purpose of information gathering, fraud, or system access.
Which of the following is a type of malware that requires user interaction to activate and replicate, often disguised as legitimate software?
A. Rootkit
B. Worm
C. Trojan
D. Ransomware
C. Trojan
Correct answer: C. Explanation: A Trojan is a type of malware that is often disguised as legitimate software. Unlike viruses and worms, Trojans require user interaction to activate and replicate, tricking users into executing them under the guise of a harmless program.
In cybersecurity, what is a ‘honeypot’ primarily used for?
A. Filtering spam emails
B. Encrypting data
C. Detecting and analyzing attacks
D. Accelerating network traffic
C. Detecting and analyzing attacks
Correct answer: C. Explanation: A honeypot in cybersecurity is a decoy system or network set up to attract potential attackers. It is used to detect, deflect, or study hacking attempts, thereby gaining insight into the methods used by attackers.
What is the primary purpose of a ‘zero-day’ exploit in cybersecurity?
A. To target known software vulnerabilities
B. To exploit vulnerabilities before they are known to the vendor
C. To create backups of critical data
D. To encrypt data for ransom
B. To exploit vulnerabilities before they are known to the vendor
Correct answer: B. Explanation: A zero-day exploit is a cyber attack that occurs on the same day a weakness is discovered in software, before the software vendor has become aware of it. Because the vendor has not had time to issue a patch, the vulnerability is open to exploitation.
Which type of attack is characterized by the insertion or “injection” of a SQL query via the input data from the client to the application?
A. Cross-Site Scripting (XSS)
B. SQL Injection
C. Buffer Overflow
D. Cross-Site Request Forgery (CSRF)
B. SQL Injection
Correct answer: B. Explanation: A SQL Injection attack occurs when an attacker is able to insert a malicious SQL statement into a SQL query through client input data. This can lead to unauthorized access to database information and manipulation of database data.
What type of cyber attack involves intercepting and altering communications between two parties without their knowledge?
A. Phishing attack
B. Man-in-the-Middle (MitM) attack
C. Distributed Denial of Service (DDoS) attack
D. SQL Injection
B. Man-in-the-Middle (MitM) attack
Correct answer: B. Explanation: A Man-in-the-Middle (MitM) attack is a form of eavesdropping where the attacker secretly intercepts and relays, and possibly alters, the communication between two parties who believe they are directly communicating with each other.
What is a ‘buffer overflow’ attack in the context of cybersecurity?
A. An attack that floods a network buffer with traffic
B. An attack that overwrites a program’s memory buffer
C. An attack targeting web application forms
D. An attack using large volumes of spam email
B. An attack that overwrites a program’s memory buffer
Correct answer: B. Explanation: A buffer overflow attack occurs when a program writing data to a buffer overruns the buffer’s boundary and overwrites adjacent memory locations. This can be exploited to execute arbitrary code or to cause a crash.
In cybersecurity what does ‘phishing’ primarily refer to?
A. Disrupting network services
B. Stealing sensitive data through a physical medium
C. Deceiving individuals into revealing personal information via electronic communication
D. Attacking the physical infrastructure of a network
C. Deceiving individuals into revealing personal information via electronic communication
Correct answer: C. Explanation: Phishing is a cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Which type of cybersecurity attack involves exploiting vulnerabilities in web applications by sending malicious scripts to end users?
A. Cross-Site Scripting (XSS)
B. Trojan Horse
C. Rootkit
D. Ransomware
A. Cross-Site Scripting (XSS)
Correct answer: A. Explanation: Cross-Site Scripting (XSS) is a security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users, often to bypass access controls or steal information.
What kind of attack involves the unauthorized interception and retransmission of a valid data transmission, often to bypass authentication processes?
A. Replay attack
B. Phishing attack
C. SQL Injection
D. Buffer overflow
A. Replay attack
Correct answer: A. Explanation: A replay attack is a network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is often done to perform unauthorized actions in a system that uses authentication sequences.
In cybersecurity, what is ‘vishing’?
A. Sending fraudulent emails to obtain sensitive information
B. Voice phishing, using the telephone system to obtain sensitive information
C. Infecting a system with a virus
D. Physically stealing data
B. Voice phishing, using the telephone system to obtain sensitive information
Correct answer: B. Explanation: Vishing, or voice phishing, involves the use of the telephone system to trick individuals into revealing sensitive information, such as credit card numbers or account passwords. It’s a form of social engineering attack.
Which type of cybersecurity threat involves exploiting a flaw in software before a patch or solution is implemented?
A. Zero-day attack
B. Phishing
C. DDoS
D. SQL Injection
A. Zero-day attack
Correct answer: A. Explanation: A zero-day attack exploits a potentially serious software security flaw that the vendor or developer may be unaware of. The term “zero-day” refers to the fact that the developers have zero days to fix the problem that has just been exposed
In the context of cybersecurity, what is ‘spear phishing’?
A. A broad attempt to trick people into revealing sensitive information
B. A highly targeted attempt to trick a specific individual or organization
C. Distributing malware through email attachments
D. Hacking into a website to steal user data
B. A highly targeted attempt to trick a specific individual or organization
Correct answer: B. Explanation: Spear phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons. It’s more targeted than regular phishing and often appears to come from a trusted source.
What is the primary purpose of ‘watering hole’ attacks in cybersecurity?
A. To infect a widely used resource to target a specific group of users
B. To encrypt a victim’s files and demand a ransom
C. To gain unauthorized access to financial information
D. To create a botnet for launching DDoS attacks
A. To infect a widely used resource to target a specific group of users
Correct answer: A. Explanation: A ‘watering hole’ attack is a security exploit in which the attacker seeks to compromise a specific group of users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user’s computer and gain access to the network at the target’s workplace.
Which cybersecurity term describes a small piece of data used to identify and authenticate a user’s session?
A. Cookie
B. Token
C. Signature
D. Certificate
B. Token
Correct answer: B. Explanation: A token in cybersecurity is a piece of data that is used to identify and authenticate a user’s session. It’s often used in various authentication and authorization processes to maintain secure access.
What is the main difference between a virus and a worm in the context of cybersecurity threats?
A. A virus requires user action to spread, while a worm spreads automatically.
B. A worm requires user action to spread, while a virus spreads automatically.
C. A virus steals data, while a worm corrupts files.
D. A worm steals data, while a virus corrupts files.
A. A virus requires user action to spread, while a worm spreads automatically.
Correct answer: A. Explanation: In cybersecurity, a virus is a type of malware that requires some form of user action to propagate, such as opening a file or running a program. A worm, on the other hand, can spread itself automatically without human interaction.
What type of cyber attack uses multiple compromised systems to target a single system, causing a Denial of Service (DoS)?
A. Phishing
B. SQL Injection
C. Distributed Denial of Service (DDoS)
D. Cross-Site Scripting (XSS)
C. Distributed Denial of Service (DDoS)
Correct answer: C. Explanation: A Distributed Denial of Service (DDoS) attack involves multiple compromised computer systems attacking a target, such as a server, website, or other network resource, causing a Denial of Service (DoS).
In cybersecurity, what does ‘ransomware’ do?
A. Encrypts data and demands payment for the decryption key
B. Steals personal information for identity theft
C. Hijacks web browsers to display unwanted ads
D. Sends spam emails from the infected computer
A. Encrypts data and demands payment for the decryption key
Correct answer: A. Explanation: Ransomware is a type of malicious software that encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. Victims are often threatened with permanent data loss if the ransom is not paid.
What is the primary purpose of a HIDS (Host-based Intrusion Detection System)?
A. To monitor and analyze the internals of a computing system
B. To manage network firewalls
C. To encrypt data transmissions
D. To provide a VPN tunnel for remote connections
A. To monitor and analyze the internals of a computing system
Correct answer: A. Explanation: A Host-based Intrusion Detection System (HIDS) is designed to monitor and analyze the internals of a computing system and the network packets on its network interfaces. HIDS can detect malicious activity on the host where it’s installed.
What is the primary purpose of the tcpdump tool in network security?
A. Monitoring network traffic for analysis
B. Managing firewall rules
C. Performing active intrusion prevention
D. Encrypting data transmissions
A. Monitoring network traffic for analysis
Correct answer: A. Explanation: tcpdump is a command-line packet analyzer tool used for network monitoring and data acquisition. It allows users to capture and display TCP/IP and other packets being transmitted or received over the network to which the host is connected.
What is the primary purpose of using a WAF (Web Application Firewall)?
A. To filter and monitor HTTP/HTTPS traffic to and from a web application
B. To provide end-to-end encryption for web traffic
C. To manage network bandwidth
D. To detect network intrusions
A. To filter and monitor HTTP/HTTPS traffic to and from a web application
Correct answer: A. Explanation: A Web Application Firewall (WAF) is designed to filter, monitor, and block HTTP/HTTPS traffic to and from a web application to protect web applications by controlling and monitoring the data that passes through.
In the context of network security, what is the main function of an IPS (Intrusion Prevention System)?
A. To detect and prevent known vulnerabilities
B. To provide a secure tunnel for data transmission
C. To encrypt data in transit
D. To analyze network traffic for performance issues
A. To detect and prevent known vulnerabilities
Correct answer: A. Explanation: An Intrusion Prevention System (IPS) is designed to detect and prevent known vulnerabilities in network traffic. It actively analyzes the traffic and can take immediate action, such as blocking traffic, to prevent potential security breaches.
In cybersecurity, what is the primary function of a SIEM (Security Information and Event Management) system?
A. Filtering spam emails
B. Providing secure remote access
C. Real-time analysis of security alerts
D. Encrypting data at rest
C. Real-time analysis of security alerts
Correct answer: C. Explanation: SIEM (Security Information and Event Management) systems provide real-time analysis of security alerts generated by applications and network hardware. They are used for log aggregation, event correlation, alerting, and reporting.