Practice Qs SEC+ Flashcards
(149 cards)
Which of the following describes the difference between a worm and a virus?
- Worms are self-replicating.
- Viruses are self-replicating.
- Worms are often malicious.
- Viruses are often malicious.
Worms are self-replicating.
Which one of the following is not an example of a denial-of-service attack?
- Gargomel
- Smurf
- Teardrop
- Fraggle
Gargomel
Which one of the following is not a type of phishing attack?
- Spear phishing
- Whaling
- Wishing
- Smishing
Wishing.
At your place of employment, you are rushing to the door with your arms full of bags. As you approach, the woman before you scans her badge to gain entrance while holding the door for you, but not without asking to see your badge. What did she just prevent?
- Phishing
- Tailgating
- Whaling
- Door diving
Tailgaiting.
Which of the following is an effective way to get information in crowded places such as airports, conventions, or supermarkets?
- Shoulder surfing
- Phishing
- Vishing
- Reverse social engineering
Shoulder Surfing.
Which one of the following is designed to execute malicious actions when a certain event occurs or a specific time period elapses?
Logic bomb
Spyware
Botnet
DDoS
Logic Bomb
Which one of the following best describes a polymorphic virus?
A virus that attacks the boot sector and then attacks the system files
A virus that infects EXE files
A virus that changes its form each time it is executed
A virus inserted into a Microsoft Office document such as Word or Excel
A virus that changes its form each time it is executed.
You discover you are unable to access files on your computer. A message appears asking for payment to allow for the recovery of your files. Which of the following is most likely?
Your files have been moved to a remote server.
Your files have been copied.
Your files have been deleted.
Your files have been encrypted.
Your files have been encrypted.
Which of the following types of attacks can result from the length of variables not being properly checked in the code of a program?
Buffer overflow
Denial of service
Replay
Spoofing
Buffer overflow
Which one of the following is a best practice to prevent code injection attacks?
Implementing the latest security patches
Session cookies
Using unbound variables
Input validation
Input validation
You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly busy time of the day, however. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?
Spoofing
Man-in-the-middle attack
Denial-of-service attack
Password attack
Denial-of-service attack
An initialization vector should be which of the following?
Unique and unpredictable
Repeatable and random
Repeatable and unique
Unique and predictable
Unique and unpredictable
How do relationship and capability pertain to understanding specific threat actors?
They are characteristics associated with building a threat profile.
They describe attributes that apply equally to all threats.
They are the two most important attributes when analyzing threat actors.
They indicate the likelihood of vulnerabilities being discovered.
They are characteristics associated with building a threat profile.
With which of the following is a “low and slow” attack most associated?
OSINT
Ransomware
Script kiddies
APT
APT
After conducting a vulnerability assessment, which of the following is the best action to perform?
Disable all vulnerable systems until mitigating controls can be implemented
Contact the network team to shut down all identified open ports
Organize and document the results based on severity
Immediately conduct a penetration test against identified vulnerabilities
Organize and document the results based on severity
You are conducting a penetration test on a software application for a client. The client provides you with details around some of the source code and development process. What type of test will you likely be conducting?
Both Black and White box
Vulnerability
White box
Black box
White box
Which of the following is a reason to conduct a penetration test?
To test the adequacy of security measures put in place
To passively test security controls
To steal data for malicious purposes
To identify the vulnerabilities
To test the adequacy of security measures put in place
Which one of the following best describes a penetration test?
A passive evaluation and analysis of operational weaknesses using tools and techniques that a malicious source might use
A technique used to identify hosts and their associated vulnerabilities
The monitoring of network communications and examination of header and payload data
An evaluation mimicking real-world attacks to identify ways to circumvent security
An evaluation mimicking real-world attacks to identify ways to circumvent security
Which one of the following best describes the four primary phases of a penetration test?
Planning, discovery, attack, reporting
Exploit, escalation, pivot, persistence
Discovery, attack, pivot, reporting
Planning, exploit, attack, persistence
Planning, discovery, attack, reporting
Your team is tasked with conducting a vulnerability assessment and reports back with a high number of false positives. Which of the following might you recommend to reduce the number of false positives?
Have the team run a vulnerability scan using noncredentialed access
Have the team run a vulnerability scan using credentialed access
Have the team run a port scan across all ports
Have the team run a port scan across all common ports
Have the team run a vulnerability scan using credentialed access
Which of the following are potential impacts of a race condition?
System malfunction
Denial of service
All answers are correct
Escalated privileges
All answers are correct
Which one of the following is the term given to a fraudulent wireless access point that is configured to lure connections to it?
NFC
ARP replay attack
Bluejacking
Evil twin
Evil twin
A small IT consulting firm has installed new wireless routers across all your small regional offices. Within days, you learn that you are unable to access the administrative interfaces of these routers due to an incorrect password. Which one of the following is most likely the reason?
The wireless routers are not powered on.
The wireless routers have been placed on end-of-life by the manufacturer and are no longer supported for remote login.
The wireless routers have been designed to allow improper input handling, resulting in failed password input.
The wireless routers were set up with the default configuration, which included a default password that was never changed.
The wireless routers were set up with the default configuration, which included a default password that was never changed.
You identify a system that becomes progressively slower over a couple days until it is unresponsive. Which of the following is most likely the reason for this behavior?
Improper error handling
Untrained user
Race condition
Memory leak
Memory leak