Someone follows you through a secure door without authenticating
What is Tailgating
What is a DoS and DDoS attack?
What is continually bombarding a targeted network with fake requests and DDoS uses a botnet
What is a test that gives little to no information about the system to the penetration tester?
What is Black Box or unknown environment testing
What requires a carrier file to self-replicate?
What is a Virus
A network site that appears to have valuable information but is in fact isolated and monitored is what kind of security measure?
What is a Honeynet
What has an embedded Wi-Fi controller that allows a remote user to send commands?
What is a Malicious Universal Serial Bus (USB) cable
Someone going through trash is called what?
What is Dumpster Diving
What is an ARP spoofing attack?
What is causing the domain name server (DNS) to return an incorrect IP address
What offers the strongest wireless signal encryption?
What is WPA (2)
Installing an application that appears to be good but is malware is called what?
What is a Trojan
Which of the following is NOT a password cracking software tool?
A. HoneyMonkey
B. Cain and Abel
C. John the Ripper
D. Hashcat
What is HoneyMonkey
some flash drives barely larger than a fingernail when inserted into a system and not detected, can do what?
What is commands can be sent and received, data exfiltrated, and malware delivered.
While on an airplane someone behind you looking at your computer screen is called what?
What is shoulder surfing
Someone posing as an IT tech requests information about your computer configuration is called what?
What is Social engineering
What are two types of intrusion detection systems?
What is Host and network (HIDS and NIDS)
A screen pops up stating "Oops all your files are now encrypted pay $300 to get them back" is what?
What is Ransomware
An event signaling an IDS to produce an alarm when no attack has taken place would be called what?
What is False Positive
What compromises your credit card information by recording it when the card is inserted into an ATM
What is a a skimming attack
What describes monitoring software installed without your consent?
What is Spyware
What describes a zero-day vulnerability?
What is an attack that exploits a previously unknown vulnerability
What describes asymmetric key encryption?
What is consists of a private signing key and a public verification key
This needs no interaction to self-propagate?
What is a Worm
Which of the following remote protocols is a secure remote access protocol?
A. SSH
B. FTP
C. Telnet
D. SMTP
What is SSH
What are individual cloning access cards called?
What is card cloning (think about badges allowing access into buildings, for example
What are two types of network layer firewalls?
What is stateful and stateless
Which of the following is NOT a DoS attack?
A. Server Spoofing
B. Ping Broadcast
C. Ping of Death
D. Smurf
What is Server Spoofing
Where in the network infrastructure would a DMZ or
Perimeter network be set up?
Where is Between the external network and the firewall
This allows someone to bypass normal authentication through a _______ door?
What is Back Door
Which of the following would NOT help secure a wireless access point?
A. Implement Smart Card authentication
B. Disable SSID broadcast
C. Disable MAC filtering
D. Enable encryption
What is Disable MAC filtering
What is leaving USB or thumb drivers around to be found
What is malicious flash drives (or “thumb” drives) within organizations