EAS PRELIMS Flashcards

(55 cards)

1
Q

What is considered the weakest link in information security systems?
A. Poorly enforced security policies
B. Unauthorized network probing
C. Use of outdated hardware or software
D. Server downtime during maintenance periods

A

A. Poorly enforced security policies

This highlights how user behavior and policy enforcement can impact security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercriminals use many different types of malware to carry out their attacks. What type of malware is used if the cybercriminal uses a program to gain unauthorized access to a system by bypassing the standard authentication procedures?
A. Worm
B. Rootkit
C. SQL injection
D. BackdoorWhich of the following is the best example of a user threat?

A

D. Backdoor

Backdoors allow unauthorized access without following normal authentication measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat actors target a company to gain access to its confidential files. They find that the company’s employees regularly frequent an outdated website for food delivery and proceed to exploit the website. What type of deception method is used?
A. Spear phishing
B. Typosquatting
C. Cross-site scripting
D. Watering hole attack

A

D. Watering hole attack

This method targets users visiting specific compromised sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You were trying to login to your bank account via a web browser. As the website of the bank is not in one of your bookmarked URLs, you search for the website via the default browser engine. You clicked the top search result but notice that the URL appears to be different than what you remember. What kind of deception method is used in this case?
A. Spear phishing
B. Typosquatting
C. Cross-site scripting
D. Watering hole attack

A

B. Typosquatting

Typosquatting involves creating fraudulent URLs that closely resemble legitimate ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a type of mobile attack where the threat actors copies mobile information like emails and contact lists using a short-range wireless technology.
A. RF jamming
B. RF hijacking
C. Bluesnarfing
D. Bluejacking

A

C. Bluesnarfing

Bluesnarfing allows unauthorized access to data on a mobile device via Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This describes a situation where a valid data transmission is maliciously or fraudulently repeated or delayed by an attacker, who intercepts, amends and resubmits the data to get the receiver to do whatever they want.
A. Race condition attack
B. Replay attack
C. Resource exhaustion attack
D. Directory traversal attack

A

B. Replay attack

Replay attacks involve intercepting and re-sending data to manipulate actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is when the cost of risk management options outweighs the cost of the risk itself.
A. Risk acceptance
B. Risk reduction
C. Risk avoidance
D. Risk transfer

A

A. Risk acceptance

Risk acceptance occurs when organizations choose to accept certain risks instead of mitigating them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is true about Internet Protocol (IP)?
A. It tracks and manages flow of packets.
B. It validates whether the source IP address in a packet came from that source.
C. It delivers packets from host to destination over an interconnected system of networks.

A

C. It delivers packets from host to destination over an interconnected system of networks.

IP is fundamental for routing packets across different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is an IPv6 header field that is equivalent to the IPv4 TTL field.
A. address resolution
B. neighbor discovery
C. sequence number
D. hop limit

A

D. hop limit

Hop limit controls the number of hops a packet can take in IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In this type of attack, the threat actor sees the traffic between the host and the target.
A. blind spoofing
B. ARP spoofing
C. non-blind spoofing
D. IP spoofing

A

C. non-blind spoofing

Non-blind spoofing allows attackers to observe the actual communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is a characteristic of UDP.
A. reliable delivery
B. flow control
C. stateless communication
D. all of the choices

A

C. stateless communication

UDP is connectionless, unreliable, and lacks error recovery mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This attack occurs when threat actors steal confidential information from an Ethernet frame in a switched LAN.
A. passive ARP poisoning
B. MAC address flooding
C. DNS spoofing
D. IP spoofing

A

A. passive ARP poisoning

Passive ARP poisoning allows attackers to intercept traffic without being detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In this attack, the threat actor gathers domain account credentials to silently create multiple sub-domains to be used during the attacks that typically point to malicious servers without alerting the actual owner of the parent domain.
A. DNS cache poisoning
B. DNS tunneling
C. DNS amplification
D. DNS domain shadowing

A

D. DNS domain shadowing

Domain shadowing involves creating subdomains that can be exploited without alerting the main domain owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This DNS stealth technique occurs when threat actors use this technique to hide their phishing and malware delivery sites behind a quickly-changing network of compromised DNS hosts and the DNS IP addresses are continuously changed within minutes.
A. fast flux
B. tunneling
C. recursive resolution
D. amplification

A

A. fast flux

Fast flux techniques involve rapid IP address changes to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This HTTP status code has a format of 4xx.
A. redirection
B. server error
C. client error
D. successful

A

C. client error

Client error codes start with ‘4xx’ indicating issues with the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In this exploit, the threat actor uses a response status code to redirect the user’s web browser to a new location. The redirect function can be used multiple times until the browser finally lands on the page that contains the exploit.
A. HTTP 302 cushioning
B. malicious iFrames
C. domain shadowing
D. SQL injection

A

A. HTTP 302 cushioning

HTTP 302 status codes indicate a temporary redirect which can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which is a potential safeguard against email threat?
A. Keep SMTP software up to date.
B. Use security appliance such as WSA to block certain traffics
C. Use Web Proxy to block malicious sites
D. all of the choices

A

A. Keep SMTP software up to date.

Regular updates to anti-SPAM software help protect against evolving email threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a worm mitigation phase that involves actively disinfecting infected systems such as terminating the worm process, removing modified files, and patching vulnerabilities the worm used to exploit the system.
A. containment
B. quarantine
C. inoculation
D. treatment

A

D. treatment

Eradication focuses on removing the worm and fixing the vulnerabilities exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which applies to IEEE 802.11 standards?
A. It applies only to wired connections.
B. Its regulations vary by country.
C. It does not support roaming.
D. It defines layer 3 protocols.

A

B. Its regulations vary by country.

IEEE 802.11 standards can differ based on regional regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following applies to passive mode for wireless client scanning/probing processes?
A. The AP openly advertises its services.
B. Wireless clients must know the name of the SSID and initiate the probe request
C. The AP creates a probe response containing SSID, supported standards, and security settings
D. all of the choices

A

A. The AP openly advertises its services.

In passive mode, access points broadcast their presence without requiring queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A threat actor introduces a rogue AP and configures it with the same SSID as a legitimate AP.
A. watering hole attacks
B. evil twin attack
C. ARP spoofing
D. replay attack

A

B. evil twin attack

An evil twin attack mimics a legitimate access point to intercept data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this security practice, the broadcasting of beacon packets by wireless APs is disabled.
A. Open authentication
B. SSID cloaking
C. MAC address filtering
D. shared key authentication

A

B. SSID cloaking

SSID cloaking hides the network name to improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In this firewall design architecture, traffic originating from the public network and traveling to the private network is generally blocked.
A. DMZ
B. ZPF
C. private and public
D. all of the choices

A

D. all of the choices

Screened subnets are designed to filter and control traffic entering private networks.

24
Q

This common type of firewall permits or denies traffic based on layers 3 to 5 of the OSI model.
A. stateless
B. stateful
C. application gateway
D. next generation

A

B. stateful

Packet filtering firewalls analyze packet headers for access control.

25
This firewall filters IP traffic between paired or bridged interfaces. A. stateless B. stateful C. host-based D. transparent
D. transparent ## Footnote Circuit-level gateways operate at the session layer to control traffic.
26
This part of the Windows boot process checks if hardware devices are initialized and are talking. It ends when the system disk is discovered. A. MBR B. BCD C. POST D. HAL
C. POST ## Footnote POST (Power-On Self-Test) ensures hardware components are functioning before booting.
27
This Windows registry holds information about all the users on the local system. A. HKEY USERS B. HKEY_CURRENT_USER C. HKEY_CURRENT_CONFIG D. HKEY_LOCAL_MACHINE
A. HKEY_USERS ## Footnote HKEY_USERS contains user-specific settings and configurations.
28
This CLI command displays active TCP connections. A. nslookup B. regedit C. netstat D. rammap
C. netstat ## Footnote Netstat provides information about network connections and listening ports.
29
It is a Linux distro that has various penetration testing tools. A. Debian B. Red Hat C. Ubuntu D. Kali
D. Kali ## Footnote Kali Linux is widely used for penetration testing and security assessments.
30
In the Linux CLI, it is a command used to display the current directory. A. mv B. pwd C. dd D. chmod
B. pwd ## Footnote 'pwd' stands for 'print working directory' and shows the current directory path.
31
In the Linux CLI, it is a command used after a pipe character to search the previous command’s outputs. A. grep B. cat C. apt-get D. man
A. grep ## Footnote 'grep' is a command-line utility for searching plain-text data for lines matching a regular expression.
32
It is the port number for HTTPS. A. 53 B. 80 C. 123 D. 443
D. 443 ## Footnote Port 443 is the standard port for secure HTTP traffic.
33
The command “ls -l filename” is issued in the Linux CLI. If one row of the output shows “-rwxrw-r--” at the start, which of the following is correct? A. The entry pertains to a folder B. The user has read and write access only C. The group has read access only. D. None of the choices
C. The group has read access only. ## Footnote This permission string indicates specific access rights for the owner, group, and others.
34
The output of “ls -l filename” shows the first field as “-rw-r--r--”. What is the permission assigned to the group of users? A. no access B. read only C. read and write D. read, write and execution
B. read only ## Footnote The group can only read the file, not write or execute it.
35
Which is an example of endpoint devices? A. router B. server C. switch D. firewall
B. server ## Footnote Endpoint devices refer to any devices that connect to the network.
36
In antimalware programs, this approach can recognize unknown malwares by comparing the current state to a baseline and by identifying what source of information is used. A. signature-based B. pattern-based C. heuristics-based D. definition-based
C. heuristics-based ## Footnote Heuristics-based detection identifies malware by analyzing behavior and characteristics.
37
It permits only authorized and compliant systems to connect to the network. A. AMP B. NAC C. ESA D. WSA
B. NAC ## Footnote NAC (Network Access Control) enforces security policies on devices connecting to the network.
38
It is a technique used to allow suspicious files to be executed and analyzed in a safe environment. A. allow list B. sandbox C. block list D. av-test
B. sandbox ## Footnote Sandboxing isolates applications to prevent them from affecting the host system.
39
It is a storage option that uses multiple hard drives in an array, combining multiple disks so that the operating system sees them as a single disk. A. DAS B. NAS C. RAID D. SAN
C. RAID ## Footnote RAID (Redundant Array of Independent Disks) combines multiple disks for performance and redundancy.
40
What possible safeguard can be used to protect the confidentiality of data in transit? A. VPN B. hashing C. mutual authentication system D. none of the choices
A. VPN ## Footnote A VPN (Virtual Private Network) encrypts data transmitted over the internet.
41
It refers to several points where attacks may get into and out of the loT system. A. Threat B. Vulnerability C. Threat actor D. Attack surface
D. Attack surface ## Footnote The attack surface encompasses all vulnerabilities that can be exploited.
42
It is a policy of an organization that is created and maintained by human resources to identify salary, pay schedule, benefits, work schedule, and others. A. company policies B. security policies C. employee policies D. all of the choices
C. employee policies ## Footnote Employee policies outline the terms of employment and benefits.
43
An example of this physical barrier is a barbed wire. A. guard shelters B. top guard C. bollard D. perimeter fence system
B. top guard ## Footnote Physical barriers like fences help secure a property against unauthorized access.
44
In this stage of the application development, software is being debugged prior to deployment. A. provisioning and deprovisioning B. staging and production C. developing and testing D. all of the choices
C. developing and testing ## Footnote This stage focuses on identifying and fixing bugs before deployment.
45
It is a security coding technique that uses precompiled statements stored in a database that execute a task. This may reduce network traffic and get faster results. A. normalization B. obfuscation C. stored procedure D. camouflage
C. stored procedure ## Footnote Stored procedures can optimize performance and enhance security.
46
It is an application security best practice that helps prove the software authenticity. A. code signing B. version control C. secure cookies D. authorization
A. code signing ## Footnote Code signing ensures that the code has not been altered and verifies the author's identity.
47
In DMZ, what are the risk and trust levels associated with a LAN? A. low risk, high trust B. medium-low risk, medium-high trust C. medium-high risk, medium-low trust D. high risk, low trust
A. low risk, high trust ## Footnote DMZs are designed to add an additional layer of security between external and internal networks.
48
In wireless APs, it is an authentication method where SAE replaced PSK making the clients less susceptible to key reinstallation attacks. A. WEP B. WPA C. WPA2 D. WPA3
D. WPA3 ## Footnote WPA3 enhances security in wireless networks by improving password protection.
49
This exploit allows a user to install unapproved apps. A. jailbreaking B. sideloading C. rooting D. piggyback riding
B. sideloading ## Footnote Jailbreaking is commonly associated with removing software restrictions on devices.
50
Which security objective is considered when single points of failure are eliminated? A. confidentiality B. availability C. integrity D. non-repudiation
B. availability ## Footnote Ensuring availability means maintaining system uptime and resilience against failures.
51
Which describes a router redundancy protocol? A. Each router shares the same physical IP address. B. Each router shares the same virtual IP address. C. The routers use their virtual IP address to send periodic messages. D. more than one of the choices
B. Each router shares the same virtual IP address. ## Footnote Router redundancy protocols help maintain network availability by using a shared virtual IP.
52
In ensuring cybersecurity resilience, an organization may deploy this type of location redundancy that updates backup data location periodically resulting in low bandwidth requirements. A point-in-time replication B. asynchronous reputation C. synchronous reputation D. non-replication
A. point-in-time replication ## Footnote Point-in-time replication allows for efficient data backups with minimal bandwidth usage.
53
It is a network of systems that mimics a network and is purposely left exposed to lure attackers. A. dns sinkhole B. watering hole C. honeynet D. honeypot
C. honeynet ## Footnote Honeynets are used for research and to detect intrusion attempts.
54
It is an example of a physical access control. A. IDS B. ACL C. laptop locks D. passwords
C. laptop locks ## Footnote Physical access controls restrict physical access to devices and sensitive areas.
55
It collects information and reports usage data. A.accountability B. authentication C. accounting D. authorization
C. accounting ## Footnote Accounting refers to tracking user activities and resource usage.