Network Devices
Types of attacks
Common Protocols
More Types of attacks
Story Questions
100

Spreads workload among various servers to ensure no single server gets overloaded

What is a Load balancer aka content switch aka content filter?

100

What happens during an XSS attack

What is attacker inserts script code into a form on a web page that gets submitted to the server, used to attack the database servers that are used to support Web Pages

100

Primary protocol to SECURELY transfer data over the internet using TLS

What is HTTPS
100

3 different kinds of password attacks

What is Dictionary attack, Brute Force attack, Hybrid attack, Birthday attack, Password Spraying

100

A software developer needs to perform code-execution testing, black-box testing, and non- functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?

A. Verification B. Validation C. Normalization D. Staging  

What is B. Validation

200

*appliance that requests resources on behalf of client machines

*hides and protects requesting client

*caches commonly requested Web pages.

What is a Proxy Server
200

The Similarities and Differences between SQL, LDAP, and XML injection attacks

What is SQL, LDAP, and XML injection attacks all insert code commands into an application (input field) attempting to have the application pass the command into the database?

What is SQL, LDAP, and XML are all different languages used to manipulate databases, SQL is the most common language used to manipulate databases?

200

Used by clients to access email on email servers and allows client to administer and organize email on the server into folders. 

Port 143

What is IMAP (Internet Message Access Protocol)

200

Attacker uses DNS poisoning to redirect traffic from a legitimate site to a different or malicious site

What is Pharming attack

200

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? 

 Option A: http://sample.url.com/ 

Option B: http://sample.url.com/someotherpage onsite/../../../etc/shadow 

Option C: http://sample.url.com/select-from-database-where-password-null 

Option D:http://redirect.sample.url.sampleurl.com/malicios-dns-redirect

What is Option B http://sample.url.com/someotherpage onsite/../../../etc/shadow 

300

The difference between NIPS and NIDS and what they stand for

What is a Network Intrusion Detection system evaluates traffic against a set of standards and identifies network breaches/attacks while a Network intrusion prevention system evaluates traffic against the same set of standards but attempts to STOP a network breach/attack.

300

ARP cache poisoning does this

The ARP cache, which maps IP addresses to MAC addresses is corrupted by an attacker with the end result being that the attacker has control of which IP addresses are associated with MAC address

300

Used to monitor and manage local area networks

Port 161

What is SNMP (Simple Network management Protocol)
300

Many of the modern network standards and devices employ techniques to mitigate the threat of of this type of wireless attack (802.11n and 802.11ac)

What is Jamming Attack

300

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)

 A. Trusted Platform Module

 B. A host-based firewall

 C. A DLP solution

 D. Full disk encryption 

E. A VPN 

F. Antivirus software

What is B (A host-based firewall) and E (A VPN)

400

system designed to protect networks from malicious content on the internet, also used as data loss prevention (DLP) measure

What is a Web Security Gateway

400

The attacker is not necessarily inside the network per se, but is in between two end points that are communicating on a network

What is Man-in-the-Middle (MitM) attack

400

Same as FTP but requires both user authentication and encryption by default.

(Do not answer with acronym)

What is SFTP (Secure file transfer Protocol)

400

Difference between a Virus, Worm, and Botnet

What is: 

Botnet

*Collection of infected systems (Zombie nodes) under the control of the attack. Zombies are used to perform other attacks. Zombie controllers will often rent out the use of a botnet for other attackers to use

Virus

*Malware that has 2 jobs - to replicate and to activate. Requires a host program, host machine, and a user action to spread. Viruses ONLY affect drives (Hard drives, USB drive, etc)

Worm

*Similar to a virus, but it replicates itself across a network without user action. Doesn’t need a host file in order to operate

400

When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of? 

A. Acceptance 

B. Mitigation 

C. Avoidance 

D. Transference

What is D (Transference)

500

OSI Layer or layers that a Firewall can be placed on

What is Layers 2, 3, 4, and 7

500

Common way to identify and remove Rouge access points and Evil Twin attacks

What is Site Surveys/create heat maps

500

*Used in Microsoft networks by Remote Desktop Connections and Remote assistance

What is RDP (Remote Desktop Protocol)

500

An attack that uses a packet sniffer to capture network session data. The attacker then re-submits the captured packets in an effort to gain access to the network

What is Replay attack

500

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company's final software releases? (Select TWO.) 

A. Unsecure protocols

 B. Use of penetration-testing utilities

 C. Weak passwords 

D. Included third-party libraries 

E. Vendors/supply chain

 F. Outdated anti-malware software

What is D and E

M
e
n
u