Harmful programs designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
A) Adware
B) Malware
C) Ransomware
D) Spyware
B) Malware
An email message containing warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others is an example of:
A) Vishing
B) Impersonation
C) Virus hoax
D) Phishing
C) Virus hoax
A situation in which an application writes to or reads from an area of memory that it is not supposed to access is referred to as:
A) DLL injection
B) Buffer overflow
C) Memory leak
D) Integer overflow
B) Buffer overflow
A command-line tool that can be used for banner grabbing is called:
A) tcpdump
B) netcat
C) Nmap
D) Wireshark
B) netcat
Which of the answers listed below refers to a deprecated TLS-based method for securing SMTP?
A) PPTP
B) STARTTLS
C) L2TP
D) SMTPS
D) SMTPS
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
A) Logic bomb
B) Trojan horse
C) Rootkit
D) Backdoor
D) Backdoor
Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.
A) True
B) False
A) True
Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?
A) Buffer overflow
B) Pointer dereference
C) Memory leak
D) Integer overflow
D) Integer overflow
Which of the command-line utilities listed below can be used to perform a port scan? (Select 2 answers)
A) Zenmap
B) Nmap
C) tcpdump
D) netcat
E) nslookup
B) Nmap
D) netcat
Which of the following answers refers to a secure implementation of a protocol used for synchronizing clocks over a computer network?
A) NTPsec
B) SNMPv3
C) SRTP
D) IPsec
A) NTPsec
Malicious code activated by a specific event is called:
A) Backdoor
B) Logic bomb
C) Dropper
D) Retrovirus
B) Logic bomb
A situation in which an unauthorized person can view another user's display or keyboard to learn their password or other confidential information is referred to as:
A) Spear phishing
B) Tailgating
C) Shoulder surfing
D) Spoofing
C) Shoulder surfing
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than it needs is called:
A) Memory leak
B) Buffer overflow
C) DLL injection
D) Integer overflow
A) Memory leak
Which of the following command-line tools is used for discovering hosts and services on a network?
A) Nmap
B) netcat
C) Zenmap
D) tcpdump
A) Nmap
What are the characteristic features of the secure version of IMAP? (Select all that apply)
A) TCP port 143
B) Secure Sockets Layer (SSL)
C) TCP port 993
D) Transport Layer Security (TLS)
E) TCP port 995
B) Secure Sockets Layer (SSL)
C) TCP port 993
D) Transport Layer Security (TLS)
Which type of Trojan enables unauthorized remote access to a compromised system?
A) pcap
B) RAT
C) MaaS
D) pfSense
B) RAT
In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.
A) True
B) False
A) True
The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks.
A) True
B) False
A) True
Which of the answers listed below refers to a command-line packet capturing utility?
A) netcat
B) Zenmap
C) tcpdump
D) Nmap
C) tcpdump
Which of the answers listed below refer(s) to POP3S encrypted communication? (Select all that apply)
A) TCP port 993
B) Secure Sockets Layer (SSL)
C) TCP port 995
D) Transport Layer Security (TLS)
E) TCP port 110
B) Secure Sockets Layer (SSL)
C) TCP port 995
D) Transport Layer Security (TLS)
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
A) Honeynet
B) Botnet
C) Quarantine network
D) Malware
B) Botnet
Which social engineering attack relies on identity theft?
A) Impersonation
B) Dumpster diving
C) Watering hole attack
D) Shoulder surfing
A) Impersonation
A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources is known as:
A) DLL
B) ISO
C) EXE
D) INI
A) DLL
The ip command in Linux is the preferred replacement for:
A) netstat
B) ifconfig
C) nslookup
D) ipconfig
B) ifconfig
Which of the following protocols are used for securing HTTP connections? (Select 2 answers)
A) SCP
B) EFS
C) SSL
D) TLS
E) STP
C) SSL
D) TLS