9.1
9.2
9.3
9.4
9.5
100

What can the most serious vulnerabilities allow an attacker to do?

Improve application security

Encrypt system files for data protection

Increase system performance

Execute arbitrary code on the system


Execute arbitrary code on the system

100

What does the term "advanced persistent threat (APT)" refer to in the context of malware?


A basic form of malware that is easily detected and removed

A type of antivirus software

A sophisticated malware attack that remains undetected

A firewall feature that blocks all incoming traffic

A sophisticated malware attack that remains undetected

100

What feature of 802.1Q do VLAN hopping attacks exploit?


Native VLANs

Port mirroring

Access control lists (ACLs)

Port security

Native VLANs

100

What is the purpose of the HOSTS file in DNS resolution?


To act as a backup for DNS servers

To store the user's browsing history

To map domain names to IP addresses

To log DNS query errors


To map domain names to IP addresses

100

On your way into the back entrance of your work building one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom.

What should you do?


Tell him no and quickly close the door.

Correct Answer:

Direct him to the front entrance and instruct him to check in with the receptionist.

Let him in.

Let him in and help him find the restroom. Then let him work.

Direct him to the front entrance and instruct him to check in with the receptionist.

200

What poses a greater threat than zero-day vulnerabilities?

Encrypted data storage

Strong password policies

Newly released software

Unpatched or legacy systems


Unpatched or legacy systems

200

What distinguishes an external threat actor from an internal threat actor?

The geographical location of the actor

The sophistication of the attack

The type of malware they use

Whether they have authorized access to the system


Whether they have authorized access to the system

200

How do attackers exploit the native VLAN feature in a VLAN hopping attack?


By sending a frame with three VLAN tag headers


By encrypting the traffic sent to the native VLAN

By crafting a frame with two VLAN tag headers

By deleting the native VLAN from the switch configuration

By crafting a frame with two VLAN tag headers

200

What is the primary difference between DNS spoofing and DNS poisoning?

Spoofing involves physical attacks on DNS servers, while poisoning does not

Spoofing is a legal method of redirecting traffic, while poisoning is not

Spoofing targets only private networks, while poisoning targets public networks

Spoofing uses false DNS requests, while poisoning manipulates cached records


Spoofing uses false DNS requests, while poisoning manipulates cached records

200

Which of the following examples BEST describes shoulder surfing?


Guessing someone's password because it is so common or simple

Giving someone you trust your username and account password

Someone nearby watching you enter your password on your computer and recording it

Finding someone's password in the trash can and using it to access their account

Someone nearby watching you enter your password on your computer and recording it

300

What is one of the key benefits of using a honeypot or honeynet in cybersecurity?

Completely eliminating cyber threats

Providing an early warning of attacks

Reducing the need for other security measures

Increasing the encryption strength

Providing an early warning of attacks

300

Which of the following best describes behavioral threat research?

A commentary describing examples of attacks and TTPs

A method for improving the encryption of data

A set of guidelines for installing security software

A database of all known computer viruses

A commentary describing examples of attacks and TTPs

300

What is the primary difference between ARP spoofing and ARP poisoning?

ARP poisoning is used to secure network communications, whereas ARP spoofing is a malicious activity.

ARP spoofing involves broadcasting fake ARP messages, while ARP poisoning refers to the state of the ARP cache.

ARP spoofing and ARP poisoning are terms for the same process, with no difference between them.

ARP spoofing is a passive attack while ARP poisoning is an active attack.

ARP spoofing involves broadcasting fake ARP messages, while ARP poisoning refers to the state of the ARP cache.

300

Which of the following can be considered a rogue device?

A wireless access point installed without IT approval

A company-issued laptop with up-to-date security software

A firewall configured by the network security team

An officially sanctioned DHCP server


A wireless access point installed without IT approval

300

Which password cracking method involves trying every possible combination to find the matching password?


Phishing

Brute Force

Social Engineering

Dictionary

Brute Force

400

What is the difficulty in implementing security controls?

They are always too complex to implement.

They only address low-level risks.

They can be expensive.

They are not supported by IT service frameworks.

They can be expensive.

400

What is the primary difference between footprinting and fingerprinting in network attacks?

Footprinting gathers general network information, while fingerprinting identifies specific device types.

Fingerprinting is a legal method of gathering information, while footprinting is not.

Footprinting aims to improve network performance, while fingerprinting does not.

Footprinting is used to enhance network security, while fingerprinting is used to decrease it.

Footprinting gathers general network information, while fingerprinting identifies specific device types.

400

What is the primary purpose of the Spanning Tree Protocol (STP) in a network?

To facilitate VLAN hopping attacks

To increase network bandwidth

To encrypt traffic between switches

To prevent switching loops


To prevent switching loops

400

Which of the following is a potential consequence of a rogue DHCP server changing the default gateway address for a subnet?


Routing communications through the attacker's machine

Increased internet speed for all clients

Improved network security and encryption

Automatic resolution of IP address conflicts

Routing communications through the attacker's machine

400

Why are longer and more complex passwords more secure against brute force attacks?


They increase the amount of time the attack takes to run.

They take less time to crack.

They are less likely to be stored in password files.

They are easier to remember.

They are less likely to be stored in password files.

500

What does "integrity" in the context of the CIA Triad mean?

The system is protected against unauthorized access and attacks.

Certain information should only be known to certain people.

The data is stored and transferred as intended and that any modification is authorized.

Information is accessible to those authorized to view or modify it.

The data is stored and transferred as intended and that any modification is authorized.

500

How are botnets typically created?

By updating devices with the latest firmware

By installing security software on devices

Through malware that opens a backdoor

Through the use of strong passwords

Through malware that opens a backdoor

500

What happens when a switch's MAC address table is overwhelmed due to a MAC flooding attack?

The switch automatically shuts down for security reasons.

The switch begins to function as a hub.

The switch increases its memory capacity automatically.

The switch only forwards traffic to the attacker's port.


The switch begins to function as a hub.

500

What is DNS server cache poisoning?

Physically damaging a DNS server to take it offline

Inserting false domain:IP mappings into a DNS server's cache

Stealing sensitive information from a DNS server's cache

Infecting a DNS server with malware to disrupt its operation

Inserting false domain:IP mappings into a DNS server's cache

500

What is a common way for threat actors to gain access to a network?

By physically breaking into server rooms

By guessing the network IP address

By obtaining credentials to access the network

By sending formal requests for access to the IT department

By obtaining credentials to access the network

M
e
n
u