SYO-501 Study Guide Flashcards
(169 cards)
A security administrator wants to implement a log-on script that will prevent MITM attacks on the local LAN. Which of the following commands should the security administrator implement within the script to accomplish this task?
A: ARP -s 192.168.1.1 00-3a-d1-fa-b1-06
B: dig -x@192.168.1.1 mypc.comptia.com
C: nmap -A -T4 192.168.1.1
D: tcpdump -Inv host 192.168.1.1 or either 00:3a:d1:fa:b1:06
A
An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation? A: Script kiddie B: Hactivist C: Cryptologist D: Security Auditor
A
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using? A: Escalation of privilege B: SQL injection C: Active Reconnaissance D: Proxy server
C
A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed? A: Non-intrusive B: Authenticated C: Credentialed D: Active
C
A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host? A: Backdoor B: Pivoting C: Persistence D: Logic Bomb
B
Which of the following is commonly done as part of a vulnerability scan? A: Exploiting misconfigured applications B: Cracking employee passwords C: Sending phishing emails to employees D: Identifying unpatched workstations
D
A security analyst is attempting to break into a client's secure network. The analyst was not given prior information about the client, except for a block of public IP addresses that are currently in use. After network enumeration, the analyst's NEXT step is to perform: A: a gray-box penetration test. B: a risk analysis. C: a vulnerability assessment. D: an external security audit. E: a red team exercise.
A
Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host? A: Remote exploit B: Amplification C: Sniffing D: Man-in-the-middle
A
Which of the following describes the key difference between vishing and phishing attacks?
A: Phishing is used by attackers to steal a person’s identity.
B: Vishing attacks require some knowledge of the target of attack.
C: Vishing attacks are accomplished using telephony services.
D: Phishing is a category of social engineering attack.
C
Which of the following should a security analyst perform FIRST to determine the vulnerabilities of a legacy system? A: Passive scan B: Aggressive scan C: Credentialed scan D: Intrusive scan
A
Which of the following components of printers and MFDs are MOST likely to be used as vectors of compromise if they are improperly configured? A: Embedded web server B: Spooler C: Network interface D: LCD control panel
A
A user downloads and installs an MP3 converter, and runs the application. Upon running the application, the antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed? A: RAT B: Worm C: Ransomware D: Bot
A
Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market? A: Competitor B: Hacktivist C: Insider D: Organized crime
A
Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS? A: Pivoting B: Process affinity C: Buffer overflow D: XSS
C
Which of the following differentiates a collision attack from a rainbow table attack?
A: A rainbow table attack performs a hash lookup.
B: A rainbow table attack uses the hash as a password.
C: In a collision attack, the hash and the input data are equivalent.
D: In a collision attack, the same input results in different hashes.
A
A security administrator is diagnosing a server where the CPU utilization is at 100% for 24 hours. The main culprit of CPU utilization is the antivirus program. Which of the following issue could occur if left unresolved? (Select TWO) A: MITM attack B: DoS attack C: DLL injection D: Buffer overflow E: Resource exhaustion
B&E
A security analyst conducts a manual scan on a known hardened host that identifies many non-compliant items. Which of the following BEST describe why this has occurred? (Select TWO)
A: Privileged-user certificated were used to scan the host
B: Non-applicable plug ins were selected in the scan policy
C: The incorrect audit file was used
D: The output of the report contains false positives
E: The target host has been compromised
B&D
When attackers use a compromised host as a platform for launching attacks deeper into a company's network, it is said that they are: A: Escalating privilege B: Becoming persistent C: Fingerprinting D: Pivoting
D
A Chief Information Officer (CIO) recently saw on the news that a significant security flaw exists with a specific version of a technology the company uses to support many critical applications. The CIO wants to know if this reported vulnerability exists in the organization and, if so, to what extent the company could be harmed. Which of the following would BEST provide the needed information? A: Penetration test B: Vulnerability scan C: Active reconnaissance D: Patching assessment report
A
Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser? A: Buffer overflow B: MITM C: XSS D: SQLi
C
Which of the following uses precomputed hashes to guess passwords? A: Iptables B: NAT tables C: Rainbow tables D: ARP tables
C
In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan, which of the following requirements is MOST likely to influence its decisions?
A: The scanner must be able to enumerate the host OS of devices scanner
B: The scanner must be able to footprint the network
C: The scanner must be able to check for open ports with listening services
D: The scanner must be able to audit file system permissions
D
A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs. Which of the following changes should the company make to reduce the risks associated with phishing attacks? (Select TWO)
A: Install an additional firewall
B: Implement a redundant email server
C: Block access to personal email on corporate systems
D: Update the X.509 certificates on the corporate email server
E: Update corporate policy to prohibit access to social media websites
F: Review access violation on the file server
C&E
A security analyst is migrating a pass-the-hash vulnerability on a Windows infrastructure. Given the requirement, which of the following should the security analyst do to MINIMIZE the risk? A: Enable CHAP B: Disable NTLM C: Enable Kerebos D: Disable PAP
B