NEW SEC+ FINAL

Ace your homework & exams now with Quizwiz!

Which of the following performs a real-time lookup of a certificate status? a. Certificate repository b. Online certificate status protocol (OCSP) c. Certificate revocation list (CRL) d. Offline CA

Online certificate status protocol

Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the network looking for additional systems accessible through advanced privileges. What should Meta do to gain repeated and long-term access to the system in the future? a. Perform privilege escalation b. Perform backdoor installation c. Perform data exfiltration d. Perform lateral movement

Perform backdoor installation

Which of the following social engineering attacks continues to be a primary weapon used by threat actors? a. Vishing b. Spear phishing c. Phishing d. Google dorking

Phishing

Rachel has taken over as a systems administrator of Creative Network, which has a network of 300 computers in two different domains. Rachel has been instructed by the CEO to ensure all employees have access to a certain set of folders on the server. The individual workstations may have the personal data of employees in a particular folder. She was informed that there have been previous instances where employees misused the machines. What policy should Rachel be setting in individual user machines and servers? Rachel should set the least functionality for the server to the users and administrative control on individual desktops. Rachel should set administrative functionality for the server to the users and least functionality on the individual desktops. Rachel should set the least functionality for both servers and user desktops. Rachel should set no access for the server and set administrative rights on desktops

Rachel should set the least functionality for both servers and user desktops.

Joseph, a white hat hacker, is approached by Sigma Technology to check the enterprise's security. He is told that the system is being checked to verify whether the higher-security mode of operations is moved automatically to another version during a cyberattack on the network, making it easier to attack. Which mode should Joseph use to test this vulnerability, and why? a. Downgrade attack b. Ciphertext attack c. Attacks on misconfigurations d. Collision attack

a. Downgrade Attack

. Which of the following trust models has only one CA signing digital certificates? a. Hierarchical trust model b. Distributed trust model c. Bridge trust model d. Web of trust model

a. Hierarchical trust model

Why is the UEFI framework considered to be better than the BIOS framework? a. It has a better user interface and supports remote troubleshooting. b. It restricts the hardware support to less than 1TB, offering better security than BIOS. c. It can identify the virus and malware in a device before the system is launched. d. It comes with additional features of OS hardening and anti-intrusion systems.

a. It has a better user interface and supports remote troubleshooting.

Which of the following refers to the method by which an iOS user can access root privileges on the device? a. Jailbreaking b. Rooting c. Keylogging d. Sideloading

a. Jailbreaking

1. Typically, certain employees of an organization get texts that update them on various IT activities. If there is a support ticket or downtime, they will receive texts to let them know about the activity. They have started to receive some messages via text instructing them to call the IT help desk at the provided number. When they call the help desk number, a recording asks them for their employee ID. Assuming that the IT department did not send those texts, which of the following social engineering attacks is this? a. Smishing b. Whaling c. Spimming d. Vishing

a. Smishing

You are the security administrator in your organization and have been asked to choose a deployment method that ensures the utmost security, where the data is stored in a centralized server and can be accessed by authorized employees using their own devices. Which of the following should you choose? a. Virtual desktop infrastructure (VDI) b. Choose your own device (CYOD) c. Corporate-owned personally enabled (COPE) d. Corporate-owned devices (COD)

a. Virtual desktop infrastructure (VDI)

5. You are hired by a startup company as a security expert. You are asked to choose an effective method to host all the enterprise's services, which must be highly secure, easily scalable, and cost-effective. Which of the following platforms is ideal in this situation? a. Legacy platform b. Cloud platform c. On-premises platform d. Root platform

b. Cloud platform

For which of the following is the Encapsulating Security Protocol (ESP) applied? a. Authentication b. Confidentiality c. Key management d. Applications

b. Confidentiality

Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised credentials to access the network? a. Non-credentialed scan b. Credentialed scan c. Intrusive scan d. Nonintrusive scan

b. Credentialed scan

Bob is sending a message to John. Which algorithm should John use to ensure that Bob is the actual sender of the message and not anyone else? a. Message digest b. Digital signature algorithm c. RIPEMD d. Symmetric cryptographic algorithm

b. Digital signature algorithm

. Which part of the NIST Cybersecurity frameworks defines the activities needed to attain the different cybersecurity results? a. Information sources b. Framework core c. Implementation tiers d. Profiles

b. Framework core

Which of the following is a snooping malware? a. Cryptomalware b. Keylogger c. PUP d. Backdoor

b. Keylogger

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network? a. Initial compromise b. Lateral movement c. Privilege escalation d. Data exfiltration

b. Lateral movement

Which of the following systems combines the functions of a printer, copier, scanner, fax machine, and special-purpose computer with a CPU? a. HVAC b. MFP c. SCADA d. UAV

b. MFP

Which of the below cryptographic protocol is an encrypted alternative to the Telnet protocol used to access remote computers? a. Transport layer security (TLS) b. Secure shell (SSH) c. Secure sockets layer (SSL) d. Secure real-time transport protocol (SRTP)

b. Secure shell (SSH)

. In a device driver manipulation attack, which of the following changes a device driver's existing code design? a. API attack b. Shimming c. Improper input handling d. Time of check/time of use in race conditions

b. Shimming

Which application protocol is used to exchange cyber threat intelligence over HTTP? a. STIX b. TAXII c. TCP d. UDP

b. TAXII

Jennifer created an e-learning web application where a login form has to be filled by the user entering the application. Jennifer created an 8-byte buffer for the user name file while developing the application. One day, the application halted with denial of service. An attack on the web application due to the incorrect entry of input values in the login screen was then discovered. What caused the denial of service issue? a. This is due to a backdoor attack. b. This is due to a buffer overflow attack. c. This is due to a race condition caused by the attack. d. This is due to an application program interface attack.

b. This is due to a buffer overflow attack.

Which of the following only encrypts the IP packet data and leaves the header unencrypted? a. Tunnel mode b. Transport mode c. Encapsulating security payload (ESP) d. Authentication header (AH)

b. Transport mode

. Which of the following is an improvement of UEFI over BIOS? a. Compatible with older devices b. enhanced boot security c. Validates the operating system before loading it. d. Shares the boot log to a secure server.

b. enhanced boot security

Which layer of the OSI model is targeted by the threat actors for layer 2 attack? a. Physical layer b. Application layer c. Data link layer d. Transport layer

c. Data link layer

Which of the following types of hackers are strongly motivated by ideology? a. Brokers b. Grey hat hackers c. Hacktivists d. Criminal syndicates

c. Hacktivists

Which cryptography method provides cryptographic solutions uniquely customized to low-power devices that need to manage resources instead of security constraints? a. Asymmetric cryptography b. Private key cryptography c. Lightweight cryptography d. Symmetric cryptography

c. Lightweight cryptography

John is appointed as a vulnerability assessment engineer in a financial organization. An audit report published by a third-party auditing firm revealed that most of the web servers have cross-site scripting and XML entity injection vulnerabilities. John has been told to perform a vulneraterm-10bility assessment on these servers to verify if the audit report is valid. He is also told that he should not attempt to engage or exploit any vulnerabilities but still needs a deeper insight. By applying his knowledge of vulnerability assessment concepts, which type of vulnerability scanning should John use? a. Intrusive noncredentialled b. Intrusive credentialed c. Nonintrusive credentialed d. Nonintrusive noncredentialled

c. Non-intrusive credentialed

A zero-day vulnerability has been found in an e-commerce website used to purchase electronics. Neither the website owner nor the general public knows about the vulnerability; it was discovered by a computer security specialist making a purchase. What should the specialist do? a. Make a report of the zero-day vulnerability and launch it to the public to make them aware. b. Be a broker and sell this zero-day vulnerability to the potential buyers so that they can decide for themselves what to do with it. c. Privately share their findings regarding the zero-day vulnerability with the e-commerce company. d. Ignore it; it is not the specialist's job to alert the website's owner about the vulnerability.

c. Privately share their findings regarding the zero-day vulnerability with the e-commerce company.

Which of the following best describes attacks due to application vulnerabilities that trick the vulnerable application(s) into producing more executable files in the system? a. Executable files attack b. System tampering c. Process spawning control d. Deprovisioning

c. Process spawning control

Which of the following encrypts one character at a time? a. ECB b. CBC c. Stream d. Block

c. Stream

. David, a software engineer, recently bought a brand new laptop because his enterprise follows the BYOD (bring your own device) model. David was part of a software development project where the software code was leaked before its release. Further investigation proved that a vulnerability in David's laptop caused the exposure. David insists he never used the laptop to access any network or integrate any devices, and the laptop was kept in a vault while not in use. Which of the following attack vectors was used by the threat actor? a. Direct access b. Wireless c. Supply chain d. Removable media

c. Supply Chain

Frank is authorized to issue mandatory security guidelines for IoT device manufacturers in the United States. Which of the following guidelines should Frank NOT issue? a. The devices' embedded systems should use network protocols that have advanced security features. b. The devices should have authentication features. c. The devices should present a cost-effective solution for consumers. d. The devices should receive updates provided by the manufacturer at least once every six months.

c. The devices should present a cost-effective solution for consumers.

Hassan has been asked to choose a mobile management tool that can provide a single management interface for application, content, and device management. Which of the following is the best solution? a. Mobile content management (MCM) tool b. Mobile device management (MDM) tool c. Unified environment management (UEM) tool d. Mobile application management (MAM) tool

c. Unified environment management (UEM) tool

Which of the following is an attack that affects data availability? a. Rogue AP b. MAC address c. On-path attack d. DDoS attack

d. DDoS attack

Which technique added to cryptographic algorithms can change a single character of plaintext into multiple characters of ciphertext? a. Eavesdropping b. Collision c. Confusion d. Diffusion

d. Diffusion

An attack where the threat actor changes the value of the variable outside of the programmer's intended range is known as _____________. a. Improper input handling b. Race condition c. Buffer overflow d. Integer overflow

d. Integer overflow

Which keys are supposed to be kept confidential and not shared with anyone? a. Public key b. Ephemeral keys c. Key pairs d. Private key

d. Private key

Which of the following is NOT a characteristic of a trusted platform module (TPM)? a. TPM provides cryptographic services in hardware instead of software. b. TPM generates asymmetric cryptographic public and private keys. c. TPM can easily be transported to another computer. d. TPM includes a pseudorandom number generator.

d. TPM includes a pseudorandom number generator.

ABC Automobiles is a large manufacturing company based in Munich, Germany. To ensure productivity, all departments like Finance, Purchase, Sales, R&D, Management, etc., are using computers, and for security, each department is placed in different physical and logical networks while interconnected. Johnson, the Vice President of IT, has requested your service in identifying a problem. Details provided by Johnson and your initial probe include the following: a. This could be a logic bomb attack. b. This could be a rootkit attack. c. This is most probably a backdoor attack. d. This is most probably a bot attack.

d. This is most probably a bot attack.

You are the security administrator for an enterprise that follows the bring your own device (BYOD) deployment model. What is the first action that you should take to protect sensitive enterprise data from exposure if an employee device is stolen and can't be located? a. You should seek the help of legal authorities. b. You should search for the thief on your own. c. You should change the data access credentials. d. You should perform a remote wipe.

d. You should perform a remote wipe.

Shaun is an external penetration testing consultant. The Chief Information Security Officer (CISO) of the organization he is working with indicated that none of the internal higher management executives should receive any kind of spear-phishing emails during Shaun's testing. Which part of the rules of engagement would cover this limitation? a. Authorization b. Other boundaries c. Initiation d. Target locations

b. Other boundaries

Which category of cybersecurity vulnerability is exploited by attackers before anyone else knows about it? a. Patches b. Platforms c. Zero day d. Third parties

c. Zero day

Which of the following is the Windows network analysis tool that checks the connection to each hop between source and destination? a. Netstat b. Pathping c. Traceroute d. Curl

b. Pathping

PDC Bank is working on creating an AI application that enables customers to send SMS to the AI application to allow banking activities from their registered ID. Jane, the project engineer, has taken bank customer data from the last few years from the server and is using it to train the ML to recognize and authenticate actual users and to ensure unauthorized users are barred from entering the application. Suppose the AI application has been compromised, and the reason has been identified as compromised data being used to improve the ML accuracy. What kind of attack is the PDC Bank application subjected to? a. Adversarial artificial intelligence b. ML algorithm security c. Tainted training data for ML d. Spyware

c. Tainted training data for ML


Related study sets

Innervation et vascularisation du tronc, du bassin et de la cuisse

View Set

Language Arts 800 Communication Quiz 3 Unit 1

View Set

Developmental psychology test #3

View Set

Virtualization and Cloud Computing (Guide to Networking - Unit 7)

View Set

Medical Terms Skeletal/Muscle: Ch.14&15

View Set

GEOG 110: Chapter 14 Landform Features

View Set

Unit 6 JOHNSON VERSUS REPUBLICAN RADICALS

View Set

Clients - Are they ready to change?

View Set