Attacks
Cryptography
Terminology
Terminology Continued
Misc
100

You download a file management application from the Internet. When you launch the application, your screen goes blank and your hard disk's active light starts flashing. You restart the computer and discover that your hard disk partitions have been deleted. This is an example of what kind of threat

A. Spyware
B. Trojan horse
C. Logic bomb
D. RAT

Trojan horse

100

Which of the following types of keys is found in a key escrow?


 A. Public

 B. Private

 C. Shared

 D. Session


Private

100

 A control implemented through administrative policies or procedures.

Administrative control

100

 An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems.  Manager is looking for a solution to reduce the number of account lockouts while improving
security. Which of the following is the BEST solution for this organization?
 A. Create multiple application accounts for each user

 B. Provide secure tokens.

 C. Implement SSO.

 D. Utilize role-based access control

Implement SSO

100

A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
A. Deterrent

 B. Preventive

 C. Detective 

D.  Compensating

Deterrent

200

A set of programs provide a hacker with administrator access to a computer that cannot be detected through normal means.
What is the BEST description of this threat? 

A. Rootkit
B. Backdoor
C. Xmas attack
D. Armored virus

Rootkit

200

A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?
A. CSR

 B. OCSP 

C. CRL 

D. SSH

CRL

200

 A physical security deterrent used to protect a computer

Cable lock

200

Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market?
A. Competitor

B. Hacktivist 

C. Insider 

D. Organized crime

 Competitor

200

A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation.  Given these requirements, which of the following technologies should the analyst recommend and configure?
  A. LDAP services

 B. Kerberos service

 C. NTLM services

 D.  CHAP services

Kerberos services

Only Kerberos that can do Mutual Auth and Delegation

300

An attacker is attempting to hack into a secure server. An insider provides the attacker with a file containing the server's hashed passwords. Company guidelines recommend using multiple word passwords.
Which type of attack would be used to most quickly find passwords in the hashed password file?

A. Dictionary attack
B. Birthday attack
C. Brute force attack
D. Rainbow table attac



Rainbow table attack

300

A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO) to provide responses to a recent audit report detailing deficiencies in the organization security controls. The CFO would like to know ways in which the organization can improve its authorization controls. Given the request by the CFO, which of the following controls should the CISO focus on in the report? (Select Three)
A. Password complexity policies 

B. Hardware tokens 

C. Biometric systems 

D. Role-based permissions 

E. One time passwords 

F. Separation of duties 

G. Multifactor authentication 

H. Single sign-on 

I. Lease privilege

Role-based permission

Separation of duties

Lease privilege

300

Server room aisles that blow cold air from the floor.

Cold aisles

300

 A form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request. Commonly sent via email.

Phishing

300

An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment DNSSEC at the organization?

TLS

400

Which security goal is compromised by a DDoS attack?

A. Availability
B. Confidentiality
C. Nonrepudiation
D. Integrit

Availability

400

Which of the following is the LEAST secure hashing algorithm?
A. SHA1 

B. RIPEMD 

C. MD5 

D. DES

MD5

400

Pretending to be another person to gain information.

Impersonation

400

An attack that uses others by deceiving them. It does not directly target hardware or software, but instead it targets and manipulates people

Social engineering

400

Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
Slow performance Word documents, PDFs, and images no longer opening A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her wordprocessor.  With which of the following is the device MOST likely infected?


A. Spyware

B. Crypto-malware

C. Rootkit 

D.  Backdoor

Backdoor

500

Which two types of attacks rely mainly on the attacker seeming to be familiar to the victim for their effectiveness? (Choose two)

A. Pharming
B. Spear phishing
C. Whaling
D. Tailgating

Spear phishing

Tailgating

500

A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.)
A. Escrowed keys 

B. SSL symmetric encryption key 

C. Software code private key 

D. Remote server public key 

E. OCSP

Software code private key

OCSP

500

 Processes or actions used to respond to situations or events

Control

500

 Typically, an email message warning of something that isn’t true, such as an outbreak of a new virus. A hoax can send users into a panic and cause more harm than the virus.

hoax

500

A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST
secure environment?


A. A perimeter firewall and IDS 

B. An air gapped compiler network

C. A honeypot residing in a DMZ 

D. An ad hoc network with NAT

 E. A bastion host

An air gapped compiler network

600

You are working on a confidential report in a crowded airport terminal. You are not connected to the airport's Wi-Fi hotspot.
What type of attack is most likely to occur?

A. NFC
B. Shoulder surfing
C. Quid pro quo
D. Man-in-the-middle

Shoulder surfing

600

You receive a direct message from a friend on a social network. The message tells you about an offer to receive a $100 gift card if you are one of the first 25 to respond to a survey. You click the link and become infected with malware.
Which two attack principles contribute to the effectiveness of this attack? (Choose two)

A. Consensus
B. Authority
C. Intimidation
D. Scarcity
E. Trust

Scarcity

Trust

600

 Looking through trash for clues—often in the form of paper scraps—to find users’ passwords and other pertinent information.

dumpster diving

600

Combining phishing with Voice over IP (VoIP

Vishing

600

An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?
A. False negative

 B. True negative 

C. False positive

D. True positive

False positive

700

Which two attacks are DoS attacks against a Wi-Fi network? (Choose two)

A. WPS attack
B. War driving
C. Jamming
D. Replay
E. IV attack

Jamming
Replay

700

Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Winch of the following should be used to sign the users' certificates?
A. RA 

B. CA

C. CRL 

D.  CSR

CA

700

 Controls and countermeasures of a tangible nature intended to minimize intrusions.

physical controls

700

Phishing only large accounts.

Whaling

700

Cybersecurity summed up in one word.

Trust

M
e
n
u