CompTIA Module 1-4 Review Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the difference between a Trojan and a RAT?

A RAT gives the attacker unauthorized remote access to the victim's computer.

Which of the following is technology that imitates human abilities?

AI

What are the two limitations of private information sharing centers?

Access to data and participation

What is another name for footprinting?

Active reconnaissance?

Which of the following is NOT a characteristic of a penetration test?

Automated

Which of the following is NOT a characteristic of malware?

Diffusion

Which of the following is NOT a means by which a bot communicates with a C&C device?

Email

An IOC occurs when what metric exceeds its normal bounds?

KRI

Josh is researching the different types of attacks that can be generated through a botnet. Which of the following would NOT be something distributed by a botnet?

LOLBins

Which of the following is NOT an advantage of crowdsourced penetration testing?

Less expensive

Which of the following is not a reason a legacy platform has not been updated?

No compelling reason for any updates

Which of the following is not a recognized attack vector?

On-prem

Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake?

Planning

What are the two concerns about using public information sharing centers?

Privacy and speed

Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?

Red Team

What term refers to changing the design of existing code?

Refactoring

Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals?

Regulations

Which is the final rule of engagement that would be conducted in a pen test?

Reporting

What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?

Requests for comments (RFCs)

Which of the following is NOT an important OS security configuration?

Restricting patch management

Which of the following can automate an incident response?

SOAR

Tuva's supervisor wants to share a recent audit outside the organization. Tuva warns him that this type of audit can only be read by those within the organization. What audit does Tuva's supervisor want to distribute?

SSAE SOC 2 Type II

Which of the following manipulates the trusting relationship between web servers?

SSRF

Which of the following groups have the lowest level of technical knowledge?

Script kiddies

Which of the following is true regarding the relationship between security and convenience?

Security and convenience are inversely proportional.

Which of the following is not true regarding security?

Security is a war that must be won at all costs.

Which of the following is false about the CompTIA Security+ certification?

Security+ is one of the most widely acclaimed security certifications.

Which of these would NOT be considered the result of a logic bomb?

Send an email to Rowan's inbox each Monday morning with the agenda of that week's department meeting.

Which statement regarding a keylogger is NOT true?

Software keyloggers are generally easy to detect.

Which stage conducts a test that will verify the code functions as intended?

Staging stage

Which of the following groups use advanced persistent threats?

State actors

Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?

White hat hackers

Which of these is a list of preapproved applications?

Whitelist

Which of the following is known as a network virus?

Worm

Which of the following attacks is based on a website accepting user input without sanitizing it?

XSS

Which tool is most commonly associated with state actors?

advanced persistent threat (APT)

After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and supervise a group of security technicians. Which of these generally recognized security positions has she been offered? a) Security administrator b) Security technician c) Security officer d) Security manager

d) Security manager

Complete this definition of information security:

through products, people, and procedures on the devices that store, manipulate, and transmit the information.

Oskar has been receiving emails about critical threat intelligence information from a public information sharing center. His team leader has asked him to look into how the process can be automated so that the information can feed directly into the team's technology security. What technology will Oskar recommend?

Automated Indicator Sharing (AIS)

Which of the following ensures that only authorized parties can view protected information?

Availability

What penetration testing level name is given to testers who have no knowledge of the network and no special privileges?

Black box

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer?

Blocking ransomware

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

Brokers

Which type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?

Buffer overflow attack

Which group is responsible for the Cloud Controls Matrix?

CSA

Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?

CSRF

Marius's team leader has just texted him that an employee, who violated company policy by bringing in a file on her USB flash drive, has just reported that her computer is suddenly locked up with cryptomalware. Why would Marius consider this a dangerous situation?

Cryptomalware can encrypt all files on any network that is connected to the employee's computer.

Luka has been asked by his supervisor to monitor the dark web for any IOCs concerning their organization. The next week, Luca reports that he was unable to find anything because looking for information on the dark web is different from using the regular web. Which of the following is FALSE about looking for information on the dark web?

Dark web search engines are identical to regular search engines.

What type of analysis is heuristic monitoring based on?

Dynamic analysis

Which of the following attacks targets the external software component that is a repository of both code and data?

Dynamic-link library (DLL) injection attack

What word is the currently accepted term to refer to network-connected hardware devices?

Endpoint

Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks were mainly for what purpose?

Fame

Which type of malware relies on LOLBins?

Fileless virus

Which of the following tries to detect and stop an attack?

HIPS

Which ISO contains controls for managing and controlling risk?

ISO 31000

Which of the following is NOT something that a SIEM can perform?

Incident response

Which of the following of the CIA Triad ensures that information is correct, and no unauthorized person has altered it?

Integrity

Which of the following is FALSE about a quarantine process?

It holds a suspicious application until the user gives approval.

What is the advantage of a secure cookie?

It is sent to the server over HTTPS.

When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique?

Lateral movement

What does Windows 10 Tamper Protection do?

Limits access to the registry.

Which of the following is not used to describe those who attack computer systems?

Malicious agent

Which boot security mode sends information on the boot process to a remote server?

Measured Boot

Which of the following is a standard for the handling of customer card information?

PCI DSS

Randall's roommate is complaining to him about all of the software that came pre-installed on his new computer. He doesn't want the software because it slows down the computer. What type of software is this?

PUP

Which of the following is not an issue with patching?

Patches address zero-day vulnerabilities

Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation?

Scope

Which of the following is NOT an improvement of UEFI over BIOS?

Support of USB 3.0

What is the term used to describe the connectivity between an organization and a third party?

System integration

Which of the following is an application protocol for exchanging cyberthreat intelligence over HTTPS?

TAXII

Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information?

TLP

Which of the following is NOT a limitation of a threat map?

They can be difficult to visualize.

Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo?

They would have to stay overnight to perform the test.

How do vendors decide which should be the default settings on a system?

Those settings that provide the means by which the user can immediately begin to use the product.

Which premise is the foundation of threat hunting?

Threat actors have already infiltrated our network.

What race condition can result in a NULL pointer/object dereference?

Time of check/time of use race condition

What is an objective of state-sponsored attackers?

To spy on citizens

Which of the following is not a general information source that can provide valuable in-depth information on cybersecurity?

Twitter

Which of the following is NOT an advantage of an automated patch update service?

Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Which model uses a sequential design process?

Waterfall model


Set pelajaran terkait

Understanding Business Chapter 11 Learn Smart

View Set

Chapter 13 Fluid and Electrolytes: Balance and Disturbance

View Set

ECN 202 - Chapter 3 Dynamic Study Module

View Set

Types of Life Insurance Policies

View Set