EAS PRELIMS Flashcards
(55 cards)
What is considered the weakest link in information security systems?
A. Poorly enforced security policies
B. Unauthorized network probing
C. Use of outdated hardware or software
D. Server downtime during maintenance periods
A. Poorly enforced security policies
This highlights how user behavior and policy enforcement can impact security.
Cybercriminals use many different types of malware to carry out their attacks. What type of malware is used if the cybercriminal uses a program to gain unauthorized access to a system by bypassing the standard authentication procedures?
A. Worm
B. Rootkit
C. SQL injection
D. BackdoorWhich of the following is the best example of a user threat?
D. Backdoor
Backdoors allow unauthorized access without following normal authentication measures.
Threat actors target a company to gain access to its confidential files. They find that the company’s employees regularly frequent an outdated website for food delivery and proceed to exploit the website. What type of deception method is used?
A. Spear phishing
B. Typosquatting
C. Cross-site scripting
D. Watering hole attack
D. Watering hole attack
This method targets users visiting specific compromised sites.
You were trying to login to your bank account via a web browser. As the website of the bank is not in one of your bookmarked URLs, you search for the website via the default browser engine. You clicked the top search result but notice that the URL appears to be different than what you remember. What kind of deception method is used in this case?
A. Spear phishing
B. Typosquatting
C. Cross-site scripting
D. Watering hole attack
B. Typosquatting
Typosquatting involves creating fraudulent URLs that closely resemble legitimate ones.
It is a type of mobile attack where the threat actors copies mobile information like emails and contact lists using a short-range wireless technology.
A. RF jamming
B. RF hijacking
C. Bluesnarfing
D. Bluejacking
C. Bluesnarfing
Bluesnarfing allows unauthorized access to data on a mobile device via Bluetooth.
This describes a situation where a valid data transmission is maliciously or fraudulently repeated or delayed by an attacker, who intercepts, amends and resubmits the data to get the receiver to do whatever they want.
A. Race condition attack
B. Replay attack
C. Resource exhaustion attack
D. Directory traversal attack
B. Replay attack
Replay attacks involve intercepting and re-sending data to manipulate actions.
This is when the cost of risk management options outweighs the cost of the risk itself.
A. Risk acceptance
B. Risk reduction
C. Risk avoidance
D. Risk transfer
A. Risk acceptance
Risk acceptance occurs when organizations choose to accept certain risks instead of mitigating them.
Which is true about Internet Protocol (IP)?
A. It tracks and manages flow of packets.
B. It validates whether the source IP address in a packet came from that source.
C. It delivers packets from host to destination over an interconnected system of networks.
C. It delivers packets from host to destination over an interconnected system of networks.
IP is fundamental for routing packets across different networks.
This is an IPv6 header field that is equivalent to the IPv4 TTL field.
A. address resolution
B. neighbor discovery
C. sequence number
D. hop limit
D. hop limit
Hop limit controls the number of hops a packet can take in IPv6.
In this type of attack, the threat actor sees the traffic between the host and the target.
A. blind spoofing
B. ARP spoofing
C. non-blind spoofing
D. IP spoofing
C. non-blind spoofing
Non-blind spoofing allows attackers to observe the actual communication.
This is a characteristic of UDP.
A. reliable delivery
B. flow control
C. stateless communication
D. all of the choices
C. stateless communication
UDP is connectionless, unreliable, and lacks error recovery mechanisms.
This attack occurs when threat actors steal confidential information from an Ethernet frame in a switched LAN.
A. passive ARP poisoning
B. MAC address flooding
C. DNS spoofing
D. IP spoofing
A. passive ARP poisoning
Passive ARP poisoning allows attackers to intercept traffic without being detected.
In this attack, the threat actor gathers domain account credentials to silently create multiple sub-domains to be used during the attacks that typically point to malicious servers without alerting the actual owner of the parent domain.
A. DNS cache poisoning
B. DNS tunneling
C. DNS amplification
D. DNS domain shadowing
D. DNS domain shadowing
Domain shadowing involves creating subdomains that can be exploited without alerting the main domain owner.
This DNS stealth technique occurs when threat actors use this technique to hide their phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts and the DNS IP addresses are continuously changed within minutes.
A. fast flux
B. tunneling
C. recursive resolution
D. amplification
A. fast flux
Fast flux techniques involve rapid IP address changes to avoid detection.
This HTTP status code has a format of 4xx.
A. redirection
B. server error
C. client error
D. successful
C. client error
Client error codes start with ‘4xx’ indicating issues with the request.
In this exploit, the threat actor uses a response status code to redirect the user’s web browser to a new location. The redirect function can be used multiple times until the browser finally lands on the page that contains the exploit.
A. HTTP 302 cushioning
B. malicious iFrames
C. domain shadowing
D. SQL injection
A. HTTP 302 cushioning
HTTP 302 status codes indicate a temporary redirect which can be exploited.
Which is a potential safeguard against email threat?
A. Keep SMTP software up to date.
B. Use security appliance such as WSA to block certain traffics
C. Use Web Proxy to block malicious sites
D. all of the choices
A. Keep SMTP software up to date.
Regular updates to anti-SPAM software help protect against evolving email threats.
It is a worm mitigation phase that involves actively disinfecting infected systems such as terminating the worm process, removing modified files, and patching vulnerabilities the worm used to exploit the system.
A. containment
B. quarantine
C. inoculation
D. treatment
D. treatment
Eradication focuses on removing the worm and fixing the vulnerabilities exploited.
Which applies to IEEE 802.11 standards?
A. It applies only to wired connections.
B. Its regulations vary by country.
C. It does not support roaming.
D. It defines layer 3 protocols.
B. Its regulations vary by country.
IEEE 802.11 standards can differ based on regional regulations.
Which of the following applies to passive mode for wireless client scanning/probing processes?
A. The AP openly advertises its services.
B. Wireless clients must know the name of the SSID and initiate the probe request
C. The AP creates a probe response containing SSID, supported standards, and security settings
D. all of the choices
A. The AP openly advertises its services.
In passive mode, access points broadcast their presence without requiring queries.
A threat actor introduces a rogue AP and configures it with the same SSID as a legitimate AP.
A. watering hole attacks
B. evil twin attack
C. ARP spoofing
D. replay attack
B. evil twin attack
An evil twin attack mimics a legitimate access point to intercept data.
In this security practice, the broadcasting of beacon packets by wireless APs is disabled.
A. Open authentication
B. SSID cloaking
C. MAC address filtering
D. shared key authentication
B. SSID cloaking
SSID cloaking hides the network name to improve security.
In this firewall design architecture, traffic originating from the public network and traveling to the private network is generally blocked.
A. DMZ
B. ZPF
C. private and public
D. all of the choices
D. all of the choices
Screened subnets are designed to filter and control traffic entering private networks.
This common type of firewall permits or denies traffic based on layers 3 to 5 of the OSI model.
A. stateless
B. stateful
C. application gateway
D. next generation
B. stateful
Packet filtering firewalls analyze packet headers for access control.