Sec+ Exam B
Which extension can be used for a scripting language based on the Microsoft's Visual Basic programming language.
.vbs
Your company has just impemented a host-based firewall and you are not sure it allows incoming SFTP connections. Which Port must you allow?
22/TCP
What is a characteristic feature of a Spraying attack?
A short list of commonly used passwords tried against large number of user accounts
An insurance company charges an additional $200 monthly premium for natural disaster coverage for your business site. What figure must you compare this against to determine whether to accept this additional coverage?
ALE
Which of the following enables the exchange of information between computer programs?
API
If an attacker manages to associate their MAC address with the IP address of the default gateway this would result in targeted host sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Which type of attack is taking place in this scenario?
ARP poisoning
Which of the following physical access control methods do not normally identify who has entered a secure area?
Access control vestibule,Hardware locks
Which of the following statements can be used to describe the characteristics of an on-path attack?
An on-path attack is also known as MITM attack
Which term fall into the category of unauthorized hacking activities?
Black hat
The act of taking control of a mobile device via a Bluetooth connection is known as:
Bluebourne
The practice of sending unsolicited messages over Bluetooth is known as:
Bluejacking
Which of the following refers to unauthorized data access of a Bluetooth device over a Bluetooth wireless network?
Bluesnarfing
Providing a high and low estimate in order to entice a more specific number is the definiton of:
Bracketing
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is called:
Buffer overflow
What is a method for requesting a digital certificate?
CSR
When you attempt to use your smartphone to connect to the coffee shop Wi-Fi, you are presented with the web page shown below. What has been configured to require web page authentication prior to your gaining Internet access?
Captive portal
Which data forensic term encompasses documenting all aspects of evidence to ensure its integrity?
Chain of custody
These actors engage in illegal activities to learn proprietary information and gain market advantage?
Competitors
What term refers to automating the integration of code changes from multiple contributors into a single software project?
Continuous integration
Which type of attack involves an attacker injecting malicious executable code into a web site page that will be viewed by others?
Cross-site scripting
Which of the following describes an application attack that relies on executing a library of code?
DLL injection
Which term best reflects what is happening in the exhibit? CMD WITH NSLOOKUP
DNS
A wireless disassociation attack is a type of:
Denial-of-Service (DoS) attack
A wireless jamming attack is a type of:
Denial-of-Service (DoS) attack
Which of the following control types is an IDS?
Detective
Which of the following refers to a situation in which domain registrants, due to unlawful actions of third parties, lose control over their domain names?
Domain hijacking
SSL stripping is an example of:
Downgrade attack,Denial-of-Service (DoS) attack
Which cryptographic approach uses points on a curve to define public and private key pairs?
ECC
You are asked to configure network security appliances to detect abnormal activities that could indicate a network attack or worm. What must you first do?
Establish a network baseline.
What can be done to protect data after a handheld device is lost or stolen?
Execute a remote wipe.
ARP poisoning is designed to spoof the IP address in namespace records whereas DNS poison is designed to spoof physical addresses in the computer's address cache.
False
PKI relies on a pair of symmetric keys in which all users must publish their private key to the system to enable senders to encrypt email messages.
False
WidgetCo datacenter is in a hostile environment and has concerns about protecting the facility from vehicle-based attacks. Which of the following BEST would protect the building from this threat?
Fencing,Bollards
You want to enable a third factor to an existing multifactor authentication. You currently implement smart card and password. Which of the following would meet the organization's needs for a third factor?
Fingerprints
You have just been assigned the role of DPO. Which privacy regulation do you fall under?
GDPR
Which of the following frameworks protects PHI?
HIPAA
Your company wants to control the PII that is stored locally on each salesperson's laptop and ensure security. Laptops have higher-than-average rate of the lost equipment within your company. Which of the following recommendations would BEST address this security concern?
Implement managed Full-disk encryption (FDE)
A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:
Improper input validation
Which of the following statements can be used to describe the characteristics of an on-path attack??
In an on-path attack, attackers place themselves on the communication route between two devices
What is it called when a trusted third party is allowed to store an organizations sensitive PKI components?
Key escrow
An attacker changed the physical address of his NIC to assume the identity of a different network host is known as:
MAC cloning
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:
ML
Your company utilizes classified data and senior leadership wants to protect the data by utilizing classification labels. Which access control schemes would be BEST for your company to implement?
Mandatory
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required is known as:
Memory leak
What is the most commonly used DDoS attack?
Network-based
Which of the following terms describes an attempt to read a variable value from an invalid memory address?
Null-pointer dereference
This type of DDoS attack targets infrastructure and industrial equipment:
OT
Which of the below refers to the most common format in which Certificate Authorities (CA) issue certificates?
PEM
What type of spam relies on text-based communication?
PUP
A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:
Pass the hash
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
RFID
The practice of modifying an application's code without changing its external behavior is referred to as:
Refactoring
What is the purpose of a DDoS attack?
Resource exhaustion
You are evaluating public cloud storage solutions. Users will be authenticated to a local server on your network that will allow them access to cloud storage. Which identity federation standard could be configured to achieve this?
SAML
Which of the following indicates an SQL injection attack attempt?
SELECT * FROM users WHERE userName = 'Bobby' AND password = '' OR '1' = '1';
Which of the following should be put in place when negotiating with Amazon Web Services about the duration of a significant security outage or incident?
SLA
Which of the following are used to facilitate randomization during the encryption process?
Salting,Initialization Vector (IV)
Which type of VPN configuration can use the Internet connection of a VPN client device to access Internet resources as opposed to the VPN-connected network's Internet connection?
Split tunnel
Select all RFID vulnerabilities:
Spoofing,Eavesdropping,Data interception,Replay attacks
Which password attack bypasses account-lockout policies?
Spraying attack
Which firmware solution can store keys used for storage media encryption?
TPM
A network administrator posts a file named Networkconfigs.txt on the desktop of an administrator account on a server in the DMZ. What term best explains what this is?
The document is a honeyfile and is meant to attract the attention of a cyberintruder.
What is skimming?
The theft of sensitive data from a payment card
Which of the following terms refers to a vulnerability caused by race conditions?
Time-of-check to time-of-use
What risk management strategy may utilize cybersecurity insurance?
Transference
A type of software that performs unwanted and harmful actions in disguise of legitimate and useful program is known as a Trojan horse. This type of malware may act like legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
In social engineering, the term "Elicitation" describes the use of casual conversation to extract non-public information from people without giving them the feeling they are being interrogated.
True
The term "Evil twin" refers to a Access Point (AP) set up to replace the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID), making it appears as a legitimate access point to connecting hosts to steal or intercept data.
True
Which statement best describe the attributes of an APT?
Typically funded by governments/nation states
Your company will be implementing two-factor authentication during the start of the next quarter. Which of the following would fulfill the your company's requirement?
USB token and PIN
An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine some security controls into one platform. Which of the following would BEST accomplish this goal?
UTM
How can users ensure that e-mail messages are not forged?
Verify the digital signatures with the sender's public key.
The practice of using a telephone system to manipulate user into disclosing confidential information is known as:
Vishing
Your direct superviser wants you to ensure that there are no exposures to well-known attacks throughout the enterprise. What is the BEST way to do this?
Vulnerability scanning
A government contracting company wants to to protect the confidentiality of data on laptops. They want to ensure that in the event a laptop is stolen the data would still be safeguarded. Which of the following would BEST suit their needs?
Whole disk encryption with two-factor authentication