foundations of information security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran's industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet? Virus Trojan horse APT Logic bomb

APT

Which of the following best describes an inside attacker? An unintentional threat actor; the most common threat. A good guy who tries to help a company see their vulnerabilities. An agent who uses their technical knowledge to bypass security. An attacker with lots of resources and money at their disposal.

An unintentional threat actor; the most common threat.

You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing? White box Black hat Black box White hat

Black box

Which of the following is the third step in the ethical hacking methodology? Gain access Reconnaissance Scanning and enumeration Clear your tracks

Gain access

Any attack involving human interaction of some kind is referred to as: Attacker manipulation A white hat hacker Social engineering An opportunistic attack

Social engineering

Which of the following best describes a script kiddie? A hacker whose main purpose is to draw attention to their political views. A hacker willing to take more risks because the payoff is a lot higher. A hacker who helps companies see the vulnerabilities in their security. A hacker who uses scripts written by much more talented individuals.

A hacker who uses scripts written by much more talented individuals.

Jason is at home, attempting to access the website for his music store. When he goes to the website, it has a simple form asking for name, email, and phone number. This is not the music store website. Jason is sure the website has been hacked. How did the attacker accomplish this hack? DNS cache poisoning Host file modification Social networking Feigning ignorance

DNS cache poisoning

Compliments, misinformation, feigning ignorance, and being a good listener are tactics of which social engineering technique? Elicitation Interrogation Preloading Impersonation

Elicitation

Implementing emergency lighting that runs on protected power and automatically switches on when the main power goes off is part of which physical control? Physical access logs Employee and visitor safety Physical access controls Perimeter barriers

Employee and visitor safety

Penetration testing is the practice of finding vulnerabilities and risks with the purpose of securing a computer or network. Penetration testing falls under which all-encompassing term? Blue teaming Network scanning Ethical hacking Red teaming

Ethical hacking

On her way to work, Angela accidentally left her backpack with a company laptop at the coffee shop. What type of threat has she caused the company? Environmental threat Cloud threat External threat Man-made threat

Man-made threat

The U.S. Department of Commerce has an agency with the goal of protecting organizational operations, assets, and individuals from threats such as malicious cyber-attacks, natural disasters, structural failures, and human errors. Which of the following agencies was created for this purpose? NIST CAPEC NVD JPCERT

NIST

Miguel is performing a penetration test on his client's web-based application. Which penetration test frameworks should Miguel utilize? NIST SP 800-115 OSSTMM OWASP ISO/IEC 27001

OWASP

Randy was just hired as a penetration tester for the red team. Which of the following best describes the red team? Is a team of specialists that focus on the organization's defensive security. Performs offensive security tasks to test the network's security. Acts as a pipeline between teams and can work on any side. Is responsible for establishing and implementing policies.

Performs offensive security tasks to test the network's security.

Important aspects of physical security include which of the following? Influencing the target's thoughts, opinions, and emotions before something happens. Preventing interruptions of computer services caused by problems such as fire. Implementing adequate lighting in parking lots and around employee entrances. Identifying what was broken into, what is missing, and the extent of the damage.

Preventing interruptions of computer services caused by problems such as fire.

The penetration testing life cycle is a common methodology used when performing a penetration test. This methodology is almost identical to the ethical hacking methodology. Which of the following is the key difference between these methodologies? Reporting Gain access Reconnaissance Maintain access

Reporting

Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to determine that, on her target network, a computer named Production Workstation has port 445 open. Which step in the ethical hacking methodology is Heather performing? Gain access Scanning and enumeration Maintain access Reconnaissance

Scanning and enumeration

A person in a dark grey hoodie has jumped the fence at your research center. A security guard has detained this person, denying him physical access. Which of the following areas of physical security is the security guard currently in? Security factors Layered defense Security sequence Physical control

Security sequence

Which of the following best describes a gray box penetration test? The ethical hacker has no information regarding the target or network. The ethical hacker is given full knowledge of the target or network. The ethical hacker is given strict guidelines about what can be targeted. The ethical hacker has partial information about the target or network.

The ethical hacker has partial information about the target or network.

Which statement best describes a suicide hacker? This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught. This hacker may cross the line of what is ethical, but usually has good intentions and isn't being malicious. This hacker is motivated by religious or political beliefs and wants to create severe disruption or widespread fear. This hacker's main purpose is to protest an event and draw attention to their views and opinions.

This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught.

The process of analyzing an organization's security and determining its security holes is known as: Ethical hacking Enumeration penetration testing Threat modeling

Threat modeling

An attack that targets senior executives and high-profile victims is referred to as: Scrubbing Pharming Vishing Whaling

Whaling

You get a call from one of your best customers. The customer is asking about your company's employees, teams, and managers. What should you do? You should not provide any information except your manager's name and number. You should provide the information as part of quality customer service. You should not provide any information and forward the call to the help desk. You should put the caller on hold and then hang up.

You should not provide any information and forward the call to the help desk.

Closed-circuit television can be used as both a preventative tool (to monitor live events) or as an investigative tool (to record events for later playback). Which camera is more vandal-resistant than other cameras? A Pan Tilt Zoom camera A bullet camera A c-mount camera A dome camera

a dome camera

Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed him how to secure the system. What type of hacker is Miguel in this scenario? Gray hat Script kiddie State-sponsored White hat

gray hat

While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which of the following would you most likely implement to keep this from happening in the future? Mantraps Cable locks Anti-passback Scrubbing

mantraps

Using a fictitious scenario to persuade someone to perform an action or give information they aren't authorized to share is called: Pretexting Preloading Footprinting Impersonation

pretexting

Brandon is helping Fred with his computer. He needs Fred to enter his username and password into the system. Fred enters the username and password while Brandon is watching him. Brandon explains to Fred that it is not a good idea to allow anyone to watch you type in usernames or passwords. Which type of social engineering attack is Fred referring to? Eavesdropping Keyloggers Shoulder surfing Spam and spim

shoulder surfing

You are instant messaging a coworker, and you get a malicious link. Which type of social engineering attack is this? Spim Surf Spam Hoax

spim

Which type of threat actor only uses skills and knowledge for defensive purposes? Script kiddie Gray hat Hacktivist White hat

white hat


Ensembles d'études connexes

Medical Scribe: Common Medications

View Set

Booker T. Washington vs W.E.B. Du Bois

View Set

Unit- 6 Le temps- Les saisons et les mois- pages 2 et 3

View Set

SUR 110 Ch.3 A Positive Care Approach AST (MT)

View Set