Review 9 Flashcards

(20 cards)

1
Q

Which of the following is a self-replicating program that does not require a host file to propagate?

Zombie

Virus

Worm

Trojan Horse

A

Worm

Worms can spread independently across networks without needing a host file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following BEST describes an inside attacker?

An unintentional threat actor (the most common threat).

An attacker with lots of resources and money at their disposal.

A good individual who tries to help a company see their vulnerabilities.

An agent who uses their technical knowledge to bypass security

A

An unintentional threat actor (the most common threat).

Inside attackers often have legitimate access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization’s receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. Which type of social engineering is this individual engaging in?

Social validation

Authority

Persuasive

Commitment

A

Authority

The individual is exploiting their perceived authority to gain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following protocols is classified as a ‘secure’ protocol?

Remote Copy Protocol (RCP)

File Transfer Protocol (FTP)

Point-to-Point Protocol (PPP)

Remote Shell (RSH)

A

Point-to-Point Protocol (PPP)

PPP is used for secure communications over point-to-point links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term describes an area of security weakness?

Exploits

Vulnerabilities

Integrity

Malware

A

Vulnerabilities

Vulnerabilities can be exploited by attackers to compromise systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary countermeasure to social engineering?

Heavy management oversight

Traffic filters

Awareness

A written security policy

A

Awareness

Training employees to recognize social engineering tactics is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol mitigates many of the security vulnerabilities present in Session and Spoofing attacks?

IPsec

IPv6

Secure MAC

IPv4

A

IPv6

IPv6 includes features that enhance security compared to IPv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a malicious program that is disguised as legitimate or desirable software?

Trojan Horse

Virus

Logic Bomb

Worm

A

Trojan Horse

Trojan Horses often trick users into installing them by appearing harmless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is used to attack a switch?

MAC Flooding

ARP Poisoning

IP Spoofing

MAC Spoofing

A

MAC Flooding

MAC Flooding can overwhelm a switch’s memory, leading to network vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term describes an exploit of an unpublished vulnerability?

Exploit attack

Zero-Day attack

Vulnerability compromise

Real-time attack

A

Zero-Day attack

Zero-Day attacks are particularly dangerous as they are unknown to security vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What term describes a security strategy based on the concept that no user or device should be allowed access to the network’s sensitive data without proper authentication and authorization within the network?

Zero Trust

Access Restriction

Role-Based Access Control

Principle of Least Privilege

A

Zero Trust

The Zero Trust model assumes that threats could originate from both inside and outside the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On your way into the back entrance of your work building one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?

Tell him no and quickly close the door.

Let him in.

Let him in and help him find the restroom. Then let him work.

Direct him to the front entrance and instruct him to check in with the receptionist

A

Direct him to the front entrance and instruct him to check in with the receptionist

Always verify the identity of individuals requesting access to secure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a common social engineering attack?

Using a sniffer to capture network traffic.

Distributing false information about your organization’s financial status.

Hoax virus information emails.

Logging on with stolen credentials

A

Hoax virus information emails

These emails often attempt to scare users into taking harmful actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT a mitigation strategy for ‘external threats’?

Firewall protection

External audits

Role-based access controls

Security awareness training

A

Role-based access controls

Role-based access controls primarily address internal security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is part of “Fingerprinting” enumeration?

Security configurations via social engineering or port scanning
Network topology discovery

Security configurations via social engineering or port scanning
Vulnerability probing

Identifying system/software versions
Network topology discovery

Vulnerability probing
Identifying system/software versions

A

Vulnerability probing
Identifying system/software versions

Fingerprinting helps identify system weaknesses through detailed analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following correctly describes the CIA triad?

Confidentiality, Integrity, Authenticity

Cryptography, Integrity, Authenticity

Confidentiality, Integrity, Accessibility

Confidentiality, Integrity, Availability

A

Confidentiality, Integrity, Availability

The CIA triad is fundamental to information security principles.

17
Q

What type of social engineering attack is it when an attacker gathers personal information about the target individual, who is a CEO?

Spearfishing

Whaling

Phishing

Vishing

A

Whaling

Whaling targets high-profile individuals to extract sensitive information.

18
Q

Which of the following is NOT one of the four components of a defense in depth strategy?

Network segmentation

Physical Access Control

Separation of duties

Honeypots

A

Physical Access Control

Physical access control is important, but not one of the core components of defense in depth.

19
Q

Which of the following describes a ‘rogue’?

A malicious device on your network

A vulnerable device

A device or service on your network that isn’t under the administrative control of the network staff

A device that has been compromised

A

A device or service on your network that isn’t under the administrative control of the network staff

Rogue devices can pose significant security risks as they may be unmanaged.

20
Q

Which of the following is not a characteristic of strong passwords?

At least 7 characters in length

Contain numbers

Consist of both uppercase and lowercase letters

Contain special characters/symbols

A

At least 7 characters in length

Strong passwords should be longer and more complex than just 7 characters.