Module 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use? A. Only use complied and not interpreted Python code B. Use the latest version of Python C. Use caution when formatting strings D. Download only vetted libraries

A. Only use compiled and not interpreted Python code

Which of the following sensors can detect an object that enters the senor's fields? A. Proximity B. Field detection C. IR verification D. Object recognition

A. Proximity

Which of the following is a third-party OS penetration testing tool? A. theHarvester B. scanless C. Nessus D. sn1per

D. sn1per

What is the difference between a DoS and a DDoS attack?

DoS attacks use fewer computers than DDoS attacks

Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?

Operational Technology (OT)

What is Bash?

The command-language interpreter for Linux/UNIX OSs

Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior? A. Tcpreplay B. Tcpdump C. Wireshark D.Packetdump

A. tcpreplay

Tomaso is explaining to a colleague the different types of DNS attacks. Which DNS attack would only impact a single user? A. DNS hijack attack B. DNS poisoning attack C. DNS overflow attack D. DNS resource attack

B. DNS poisoning attack

Which of the following is NOT a reason that threat actors use PowerShell for attacks? A. It cannot be detected by antimalware running on the computer B. It leaves behind no evidence on a hard drive C. It can be invoked prior to system boot D. Most applications flag it as a trusted application

C. It can be invoked prior to system boot

Deacon has observed that the switch is broadcasting all packets to all devices. He suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this? A. MAC spoofing attack B. MAC cloning attack C. MAC flooding attack D. MAC overflow attack

C. Mac Flooding Attack

Which of the following is NOT a Microsoft defense against macros? A. Protected View B. Trusted documents C. Trusted domain D. Trusted location

C. Trusted Domain

Which of the following does NOT describe an area that separates threat actors from defenders? A. DMZ B. Air gap C. Secure Area D. Containment space

D. Containment space

Which of the following is NOT true about VBA? A. It is commonly used to create macros B. It is built into most Microsoft Office applications C. It is included in select non-Microsoft products D. It is being phased out and replaced by PowerShell

D. It is being phased out and replaced by PowerShell

Calix was asked to protect a system from a potential attack on DNS. What are the location he would need to protect?

Host table and external DNS server

Which attack intercepts communications between a web browser and the underlying computer?

Man-in-the-browser (MITB)

What is the result of an ARP poisoning attack?

The ARP cache is compromised

Gregory wants to look at the details about the patch a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?

Traceroute

Estevan has recommended that the organization hire and deploy security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?

Two-person integrity/control

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

cat

Which utility sends custom TCP/IP packets?

hping


Conjuntos de estudio relacionados

microbiology test #1 study guide ch 4-5

View Set

Organic Compounds Structure & Nomenclature

View Set

Chapter 23 Endocrine System Drugs

View Set