CyberSecurity Module 5
Which of the following is NOT a Microsoft Windows common LOLBin?
a. DLR
Which of the following is NOT correct about a secure cookie?
a. It is a means of protection of a web browser.
Cillian is explaining to an intern why ransomware is considered to be the most serious malware threat. Which of the follow reasons would Cillian NOT give?
a. Once a device is infected with ransomware, it will never function normally.
Which of the following manipulates the trusting relationship between web servers?
a. SSRF
Which of these would NOT be considered the result of a logic bomb?
a. Send an email to Rowan's inbox each Monday morning with the agenda of that week's department meeting.
Nollaig is reviewing the steps that an attacker took when they compromised a web server and accessed confidential files. What type of attack was this?
a. directory traversal
Which of the following types of computer viruses is malicious computer code that becomes part of a file?
a. file-based virus
Which of the following would NOT be considered an IoA?
a. resource manipulation
Which of the following is NOT true about RATs?
b. A RAT and a worm have the same basic function.
Finn's team leader has just texted him that an employee, who violated company policy by bringing in a file on a USB flash drive, has just reported that their computer is infected with locking ransomware. Why would Finn consider this a serious situation?
b. It can encrypt all files on any network that is connected to the employee's computer.
Which of the following attacks is based on a website accepting user input without sanitizing it?
b. XSS
What word is the currently accepted term that is used today to refer to network-connected hardware devices?
b. endpoint
Which of the following is sometimes called a "network virus" because it enters a computer to move through the network?
b. worm
Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?
c. CSRF
Which of the following is NOT a feature of blocking ransomware?
c. It can be defeated by a double power cycle.
Which statement regarding a keylogger is NOT true?
c. Software keyloggers are generally easy to detect.
What is the difference between a keylogger and spyware?
c. Spyware typically secretly monitors users but unlike a keylogger makes no attempts to gather sensitive user keyboard input.
Which of the following is NOT a technology used by spyware?
c. active tracking technologies
What race condition can result in a NULL pointer/object dereference?
d. Time of check (TOC) to time of use (TOU)
Which type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?
d. buffer overflow attack