Sec + Flash Cards
(128 cards)
Chapter 1: Social Engineering Techniques
While waiting in the lobby of your building for a guest, you notice a man in a red shirt standing close to a locked door with a large box in his hands. He waits for someone else to come along and open the locked door and then proceeds to follow her inside. What type of social engineering attack have you just witnessed?
A. Impersonation
B. Phishing
C. Boxing
D. Tailgating
D. Tailgating
Chapter 1: Social Engineering Techniques
A colleague asks you for advice on why he can’t log in to his Gmail account. Looking at his browser, you see has typed www.gmal.com in the address bar. The screen looks very similar to the Gmail login screen. Your colleague has just fallen victim to what type of attack?
A. Jamming
B. Rainbow Table
C. Whale Phishing
D. Typosquatting
D. Typosquatting
Chapter 1: Social Engineering Techniques
A user in your organization contacts you to see if there’s any update to the “account compromise” that happened last week. When you ask him to explain what he means, and the user tells you he received a phone call earlier in the week from your department and was asked to verify his user ID and password. The user says he gave the caller his user ID and password. This user has fallen victim what specific type of attack?
A. Spear Phishing
B. Vishing
C. Phishing
D. Replication
B. Vishing
Attacker used the social engineering attack that uses voice communication.
Chapter 1: Social Engineering Techniques
Coming into your office, you overhear a conversation between two security guards. One guard is telling the other she caught several people digging through the trash behind the building early this morning. The security guard says the people claimed to be looking for aluminum cans, but only had a bag of papers - with no cans. What type of attack has this security guard witnessed?
A. Spear Phishing
B. Pharming
C. Dumpster Diving
D. Rolling Refuse
C. Dumpster Diving
Chapter 1: Social Engineering Techniques
Which of the following are specifically used to spread influence, alter perceptions, and sway people toward a position favored by those spreading it?
A. Identity fraud, invoice scams, credential harvesting
B. Hoaxes, eliciting information, urgency
C. Influence campaigns, social media, hybrid warfare
D. Authority, intimidation, consensus
C. Influence campaigns, social media, hybrid warfare
Chapter 1: Social Engineering Techniques
Which type of the following is a type of social engineering attack in which an attacker attempt to obtain sensitive information from a user by masquerading as a trusted entity in an email?
A. Phishing
B. Pharming
C. Spam
D. Vishing
A. Phishing
Key element in a phishing attack are the use of emails.
Chapter 1: Social Engineering Techniques
Which of the following is/are psychological tools used by social engineers to create a false trust with a target?
A. Impersonation
B. Urgency or scarcity
C. Authority
D. All of the above
D. All of the above
Chapter 1: Social Engineering Techniques
Once an organization’s security policies have been established, what is the single most effective method of countering potential social engineering attacks?
A. An active security awareness program
B. A separate physical access control mechanism for each department in the organization
C. Frequent testing of both the organization’s physical security procedures and employee telephone practices.
D. Implementing access control cards and the wearing of security identification badges.
A. An active security awareness program.
People are the weakest link, to an organization when dealing with a cyber attack.
Chapter 1: Social Engineering Techniques
You notice a new custodian in the office, working much earlier than normal, emptying trash cans, and moving slowly past people working. You ask him where the normal guy is, and in very broken English he says, “Out sick”, indicating a cough. What is happening?
A. Watering hole attack
B. Impersonation
C. Prepending
D. Identity fraud
B. Impersonation
The new custodian working much earlier, moving slow past workstations, he was being very “suspicious”
Chapter 1: Social Engineering Techniques
Your boss thanks you for pictures you sent from the recent company picnic. You ask him what he is talking about, and he says he got an e-mail from you with pictures from the picnic. Knowing you have not sent him that e-mail, what type of attack do you suspect is happening?
A. Phishing
B. Spear Phishing
C. Reconnaissance
D. Impersonation
B. Spear Phishing
This was a targeted attack against a specific person.
Chapter 2: Type of Attack Indicatiors
A disgruntled administrator is fired for the negligence at your organization. Thirty days later, your organization’s internal file server and backup server crash at exactly the same time. Examining the servers, you determine that critical operating system files were deleted from both systems. If the disgruntled administrator was responsible for administering those servers during her employment, this is most likely an example of what kind of malware?
A. Crypto-malware
B. Trojan
C. Worm
D. Logic Bomb
D. Logic Bomb
Chapter 2: Type of Attack Indicators
A colleague has been urging you to download a new animated screensaver he has been using for several weeks. While he is showing you the program, the cursor on his screen moves on its own and a command prompt window opens and quickly closes. You can’t tell what if anything was displayed in that command prompt window. your colleague says, “it’s been doing that for a while, but it’s no big deal.” Based on what you’ve seen, you suspect the animated screensaver is really what type of malware?
A. A worm
B. A trojan
C. Ransomware
D. Spyware
B. A trojan
Chapter 2: Type of Attack Indicators
Several desktops in your organization are displaying a red screen with the message “Your files have been encrypted. Pay 1 bitcoin to recover them.” These desktops have most likely been affected by what type of malware?
A. Spyware
B. Spraying
C. Ransomware
D. Crypto-malware
C. Ransomware
Chapter 2: Type of Attack Indicators
While port-scanning your network for unauthorized systems, you notice one of your file servers has TCP port 31337 open. When you connect to the port with the security tool netcat, you see a prompt that reads, “Enter password for access.” Your server may be infected with what type of malware?
A. PUP
B. Fileless Virus
C. Backdoor
D. Man In The Middle Attack (MITM)
C. Backdoor
Chapter 2: Type of Attack Indicators
While port scanning your network for unauthorized systems, you noticed one of you file servers has TCP port 61337 open. When you use Wireshark and examine the packets, you see encrypted traffic, in single packets, going back and forth every five minutes. The external connection is a server outside of your organization. What is this connection?
A. Command and control
B. Backdoor
C. External backup location
D. Remote Login
A. Command and control
Periodic traffic that looks looks like a heartbeat on high ports to an unknown server outside the network is suspicious, and this is what many command and control signals look like.
Chapter 2: Type of Attack Indicators
A user in your organization is having issues with her laptop. Every time she opens a web browser, she see different pop up ads every few minutes. It doesn’t seem to matter which websites are being listed – the pop ups still appear. What type of attack does this sound like?
A. A potentially unwanted program (PUP)
B. Ransomware
C. Worm
D. Virus
A. A potentially unwanted program (PUP)
The web browser was bundle with other applications and is performing tasks that are undesired.
Chapter 2: Type of Attack Indicators
User at your organization are complaining about slow systems. Examining several of them, you see that CPU utilization is extremely high and a process called “btmine” is running on each of the affected systems. You also notice each of the affected systems is communicating with an IP address outside your country on UDP port 43232. If you disconnect the network connections on the affected systems, the CPU utilization drops significantly. Based on what you’ve observed, you suspect these systems are infected with what type of malware?
A. Rainbow tables
B. Crypto-malware
C. Dictionary
D. Hybrid
B. Crypto-malware
Chapter 2: Type of Attack Indicators
A piece of malware is infecting the desktops in your organization. Every hour, more systems are infected. The infections are happening in a different departments and in cases where the users don’t share any files, programs, or even emails. What type of malware can cause this type of infection?
A. Virus
B. Trojan
C. RAT
D. Worm
D. Worm
The malware is moving across the network
Chapter 2: Type of Attack Indicators
Which of the following are characteristics of remote access trojans?
A. They can be deployed through malware such as worms.
B. They allow attacks to connect to the system remotely.
C. They give attackers the ability to modify files and change settings.
D. All of the above
D. All of the above
Chapter 2: Type of Attack Indicators
To test your systems against weak passwords, you as an admin ( with proper permissions) test all the accounts using Top 100 commonly used passwords. What is this test an example of?
A. Dictionary
B. Password spraying
C. Rainbow tables
D. Online
B. Password spraying
Using preset passwords against all accounts is an example of password spraying
Keyword: systems ( meaning multiple computers, servers)
Chapter 3: Application Attack Indicators
When an attacker captures network traffic and retransmits it at a later time, what type of attack are they attempting?
A. Denial of service attack
B. Replay attack
C. Bluejacking attack
D. Man in the middle attack
B. Replay attack
Chapter 3: Application Attack Indicators
What type of attack involves an attacker putting a layer of code between an original device driver and the operating system?
A. Refactoring
B. Trojan horse
C. Shimming
D. Pass the hash
C. Shimming
Chapter 3: Application Attack Indicators
You’re reviewing a custom web application and accidentally type a number in a text field. The application returns an error message containing variable names, filenames, and the full path of the application. This is an example of which of the following?
A. Resource exhaustion
B. Improper error handling
C. Generic error message
D. Common misconfiguration
B. Improper error handling
Chapter 3: Application Attack Indicators
You’re working with a group testing a new application. You’ve noticed that when three or more of you click Submit on a specific form at the same time, the application crashes every time. This is most likely an example of which of the following”
A. A race condition
B. A nondeterministic error
C. An undocumented feature
D. A DLL injection
A. A race condition