Infosec 101
Hacking
DefenseOps
ELI-5 Tech
Governance
100

An Unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

Social engineering

100

se le pide a un hacker ético que que ejecute pruebas y lo único que le porporcionan es una URL
qué tipo de hackeo es:

caja negra

100

you'll likely shake ur head when u see telnet available normally seen on this port

23

100

jelly bean, kitkat, lollipop, marshmallow, nougat, oreo,
son versiones de... ?

android

100

Before applying a software update to production systems, it is MOST important that
a) Full disclosure information about the threat that the patch addresses is available
b) The patching process is documented
c) The production systems are backed up
d) An independent third party attests the validity of the patch

c) The production systems are backed up

200

Beware of these types of programs that track every stroke you make while typing in an effort to glean your password

Keylogger

200

Dispositivo utilizado para bloquear el espectro de radiofrecuencias

jammer

200

una compañía sufre un ataque de DDoS; tienen la dirección IP del atacante y quieren contactar al ISP para reportar
qué comando pueden ejecutar para obtener más información de la IP que tienen?

whois lookup

200

A network technician is connecting to a switch to modify the configuration. DHCP is not enabled on the management port. Which of the following does the technician need to configure to connect to the device?

IP Address

200

Technical evaluation of assurance to ensure that security requirements have been met is known as?

a) Accreditation

b) Certification

c) Validation

d) Verification

b) Certification

300

Phishing scams targeting people holding high positions in an organizations or business are known as:

Whaling

300

Malicious code activated by a specific event is called:

Logic Bomb

300

Qué protocolo de autenticación transmite las contraseñas sin cifrado y por lo tanto es considerado inseguro
RADIUS
PAP
TACACS+
CHAP

PAP

300

In a linux based OS, You are trying to find out which of your plugged in network adapters supports WiFi, what command should you use in your terminal window?

iwconfig

300

A software or hardware-based security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network (data exfiltration) is known as:

DLP

400



Logging is an example of which type of defense against systems compromise?

    A. Containment
    B. Detection
    C. Reaction
    D. Recovery

    B. Detection

400

a malicious collection of software tools used by a hacker to mask instrusion and obtain administrator-level access to a computer or a computer network is known as

rootkit

400

Jason is the local network administrator who has been tasked with securing the network from possible DoS attacks. Within the last few weeks, some traffic logs appear to have internal clients making requests from outside the internal LAN. Based on the traffic Jason has been seeing, what action should he take?  

A. Throttle network traffic.
B. Update antivirus definitions.
C. Implement egress filtering.
D. Implement ingress filtering.

D. Implement ingress filtering.

400

What is a rainbow table?

Port knocking (Tocar puertos) es un metodo discreto de abrir puertos que, por default, el firewall mantiene cerrado.  Funciona requiriendo intentos de conexion a una serie de puertos predefinidos cerrados. Cuando la sequencia correcta de "toquidos" a puertos (intentos de coneccion) es recibida, el firewall abre entonces cierto(s) puerto(s).

El beneficio es que, en un escaneo de puertos normal, pareceria que el servicio del puerto simplemente no esta disponible. 

400
The PRIMARY objective of a security steering group is to:  


A. ensure information security covers all business functions.

B. ensure information security aligns with business goals.

C. raise information security awareness across the organization.

D. implement all decisions on security management across the organization.

B. ensure information security aligns with business goals.

500

Explica que es port knocking y cuál es su beneficio

Port knocking (Tocar puertos) es un metodo discreto de abrir puertos que, por default, el firewall mantiene cerrado.  Funciona requiriendo intentos de conexion a una serie de puertos predefinidos cerrados. Cuando la sequencia correcta de "toquidos" a puertos (intentos de coneccion) es recibida, el firewall abre entonces cierto(s) puerto(s).

El beneficio es que, en un escaneo de puertos normal, pareceria que el servicio del puerto simplemente no esta disponible. 

500

Given the following logs:

Aug 18 11:00:57 comptia sshd[5657]: Failed password for root from 10.10.10.192 port 38980 ssh2

Aug 18 23:08:26 comptia sshd[5768]: Failed password for root from 18.70.0.160 port 38156 ssh2

Aug 18 23:08:30 comptia sshd[5770]: Failed password for admin from 18.70.0.160 port 38556 ssh2

Aug 18 23:08:34 comptia sshd[5772]: Failed password for invalid user asterisk from 18.70.0.160 port 38864 ssh2

Aug 18 23:08:38 comptia sshd[5774]: Failed password for invalid user sjobeck from 10.10.1.16 port 39157 ssh2

Aug 18 23:08:42 comptia sshd[5776]: Failed password for root from 18.70.0.160 port 39467 ssh2      


Which of the following can be suspected?

a) An unauthorized user is trying to gain access from 10.10.10.192.

b) An authorized user is trying to gain access from 10.10.10.192.

c) An authorized user is trying to gain access from 18.70.0.160.

d) An unauthorized user is trying to gain access from 18.70.0.160.

d) An unauthorized user is trying to gain access from 18.70.0.160.

500

       08. The SELinux and AppArmor security frameworks include enforcement rules that attempt to prevent which of the following attacks?

       a) Lateral movement

       b) Sandbox escape

       c) Cross-site request forgery (CSRF)

       d) Cross-site- scripting (XSS)

       b) Sandbox escape

500

bitcoins blocks area hashed using this cryptographyc algortihm

sha 256

500

Which of the following can BEST be used to capture detailed security requirements?

a) Threat modeling, covert channels, and data classification. b) Data classification, risk assessments, and covert channels c) Risk assessments, covert channels, and threat modeling     d) Threat modeling, data classification, and risk assessments

d) Threat modeling, data classification, and risk assessments

M
e
n
u