Cybersecurity Concepts and Attack Types

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Security manager

After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and supervise a group of security technicians. Which of these generally recognized security positions has she been offered?

Host table and external DNS server

Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?

information security

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information...

MAC flooding attack

Deacon has observed that the switch is broadcasting all packets to all devices. He suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this?

Stateful packet filtering

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?

cat

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

Two-person integrity/control

Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?

traceroute

Gregory wants to look at the details about the path a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?

Masking

Hanna has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?

default settings

How do vendors decide which should be the default settings on a system?

BPDU guard

How does BPDU guard provide protection?

Active-active

In which of the following configurations are all the load balancers always active?

Policy-based firewall

Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?

Fame

Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks were mainly for what purpose?

DNS sinkhole

Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?

IoT

Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?

Split tunnel

Sofie needs to configure the VPN to preserve bandwidth. Which configuration would she choose?

Python best practices

Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use?

Bash

What is Bash?

virtual firewall

What is a virtual firewall?

state-sponsored attackers

What is an objective of state-sponsored attackers?

Brokers

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

DoS and DDoS attack

What is the difference between a DoS and a DDoS attack?

ARP poisoning attack

What is the result of an ARP poisoning attack?

System integration

What is the term used to describe the connectivity between an organization and a third party?

DNS poisoning attack

Which DNS attack would only impact a single user?

Man-in-the-browser (MITB)

Which attack intercepts communications between a web browser and the underlying OS?

Forward proxy server

Which device intercepts internal user requests and then processes those requests on behalf of the users?

Force Deny

Which firewall rule action implicitly denies all other traffic unless explicitly allowed?

High-interaction honeypot

Which of the following contains honeyfiles and fake telemetry?

Containment space

Which of the following does NOT describe an area that separates threat actors from defenders?

Confidentiality

Which of the following ensures that only authorized parties can view protected information?

network hardware security module

Which of the following functions does a network hardware security module NOT perform?

Script kiddies

Which of the following groups have the lowest level of technical knowledge?

State actors

Which of the following groups use advanced persistent threats?

Microsoft defense against macros

Which of the following is NOT a Microsoft defense against macros?

NAC option

Which of the following is NOT a NAC option when it detects a vulnerable endpoint?

firewall rule parameter

Which of the following is NOT a firewall rule parameter?

PowerShell

Which of the following is NOT a reason that threat actors use PowerShell for attacks?

L2TP

Which of the following is NOT correct about L2TP?

VBA

Which of the following is NOT true about VBA?

Nessus

Which of the following is a third-party OS penetration testing tool?

Tcpreplay

Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior?

CompTIA Security+ certification

Which of the following is false about the CompTIA Security+ certification?

basic configuration management tool

Which of the following is not a basic configuration management tool?

legacy platform

Which of the following is not a reason a legacy platform has not been updated?

attack vector

Which of the following is not a recognized attack vector?

patching

Which of the following is not an issue with patching?

security

Which of the following is not true regarding security?

Malicious agent

Which of the following is not used to describe those who attack computer systems?

security and convenience

Which of the following is true regarding the relationship between security and convenience?

Integrity

Which of the following of the CIA Triad ensures that information is correct, and no unauthorized person has altered it?

Proximity sensor

Which of the following sensors can detect an object that enters the sensor's field?

UTM

Which of these appliances provides the broadest protection by combining several security functions?

load balancer scheduling

Which of these is NOT used in scheduling a load balancer?

demilitarized zone (DMZ)

Which statement regarding a demilitarized zone (DMZ) is NOT true?

Advanced persistent threat (APT)

Which tool is most commonly associated with state actors?

Gray hat hackers

Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?

Anomaly monitoring

Which type of monitoring methodology looks for statistical deviations from a baseline?

hping

Which utility sends custom TCP/IP packets?


संबंधित स्टडी सेट्स

Family and Consumer Science Chapter 1-2

View Set