Cyber Security Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/296

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

297 Terms

1
New cards

Serafina is studying to take the Security+ certification exam. Which of the following CIA elements ensures that only authorized parties can view protected information

Confidentiality

2
New cards

Which of the following is NOT a message-based attack surface

Network Protocols

3
New cards

Which of the following AAA elements is applied immediately after a user has logged into a computer wit their username and password

Authorization

4
New cards

Which of the follow controls is NOT implemented before an attack occurs

Detective control

5
New cards

What is another name for “attack surface”

Threat vector

6
New cards

Which tool is most commonly associated with nation-state actors

APT (Advanced Persistent THreat)

7
New cards

Complete this definition of information secutirty: That which protects the integreity, confidentiality, and availability of information _____

THrough products, people, and procedures on the devices that store, manipulate, and transmit the information

8
New cards

Which of the following is NOT true about supply chains

Vendors are the first step in a supply chain

9
New cards

Which specific type of control is inteded to mitigate damage caused by an attack?

Correcrive control

10
New cards

Ginerva is explaining to her roommate the relationship between security and convenience. which statement most accurately indicates this relationship

Security and convenience are inversely proportional

11
New cards

what is the primary motivation of hacktibists

Disruptions/chaos

12
New cards

Gia has been asked to enhance the secuirty awareness training workshop for new hires. Which category of secuirty control would GIa be using

Operational

13
New cards

Which of the following groups the lowst level of technical knowldge for carrying out cyberattacks

Unskilled sttackers

14
New cards

What is considered the motovation of an employee who practices shadow IT

Ethical

15
New cards

A large complex is being constructed on a resitrcted site. THey require a very high-speed, low maiteance classified network. What type of PDS should they install

Alarmed carrier PDS

16
New cards

Which of the following most accurately describes the differences or similarities between misinformation and disinformation

A false warning is an example of disinformation

Disinformation is a type of misinformation

17
New cards

Gemalyn enters websiteA.com in the address bar of a browers but is redirected to websiteB.copm due to an infected DNS. What type of explot did Gemalyn experience?

A redirection techniquer called Pharming

18
New cards

Which of the following statments best describes how a Faraday cage prevents data leackage

It is used to prevent EMI from escaping the enclosure

19
New cards

Company A sends a fictitous overdue invoice that appears legitmate via email to Company B, a large corporation. Company A hopes that Comapny B will comply and make the payment without ivnestigating. What type of attack is this?>

Phising

BEC

20
New cards

Which of the following most accurately describes the simiarlties and/or differences between spear phising and whaling

Whaling targets wealthy indidvuals and senior execurives

Spear phising used customized information to targest specific users

21
New cards

Lamarr receives a text message indicating the password to hi bank accoutn has been changed buy needs vrification to commit he chage. It inculdes a numer to call and a link, both of which will elad to fraud if Lamarr follows through with instructions. This is an example of what type of attack?

Smishing

22
New cards

Which of the following lists the data type in order from the type that needs the highest level of pretion to he lowest leve?

Confidential, private, sensitive

23
New cards

An individual who was recently fired goes to their former place of eomployment on a weekend. Since they are unable to enter, securityy goes to the frton door to inquire. the fired employee says they forgot their access card adn justneeds to pickup their tablet in their office

Human Vector

24
New cards

You are tasked with installing a system in a large wearehouse that is capable of detecing levels of daylight to dim interior lights to conserve energy. In addtion, if an intruder enters the warehouse an alarm should be triggered. The system you isntall will mostly likey support what type of signal/radio wave

Microwave

25
New cards

Karlo installs an alarm sysstem that is capable of emitting and dececting a signal i nthe light spectrum. The capability serves the purpose of decting motion andhow close an object is in a limted space. Which of the following best describes the type of signal the emitter can transmit

Infrared

26
New cards

Which of teh following most accurately describes the differences or simiarlites between typo squaitting and cybersquatting?

Cybersquatting is registering a domain that contains tradmarks and then selling it

a domain name with a onel etter change relative to an authentic site is an example of typo squatting

27
New cards

The CEO of a smal retail chain is visitng a client. They call hte help desk in a panic to request a password reset because it expire. The technician says they are not allowed to manually reset passwords but to kindly use the online password reset system. The CEO gets irate, says your fired and hangus up.

The technician did the right thing

28
New cards

What type of security buffer are you msot likey to encourter at a high security data center that inforces restricted access and requires asecurity clearance to gain entry

Access control vestibule

29
New cards

A group of scientists are trying to vigorously proect a mjaor discovery that will poetentially lad to a series of breakthrough products. Thety all sign a special nondisclosure agreement and commit to not reavaling the information to others outside the deparment.

Secuyrity through obscurity

30
New cards

Adelli sends an image file containing a secret message to her sister as an attachment. Adelli gives her sister isntructions over the phone on how to read the message. The sister fllowx hte instructions and reads the message.

Steganography Whic

31
New cards

h key combination would the recipein of a messsage use to confirm the integrity of the message as well as the authenticity of the sender

The sender’s pblic key and recipients private key

32
New cards

Which of the following statments proper expresses the characteristiscs of AES and Blowfish

AES is capable of usign 256 bit key

AES and blowfish use prvate key cryptography

Blow fish operates on 64-bit blocks

33
New cards

A company is exploring a verity of symmetric key algorithms to use in an app.

The key must be kept private

34
New cards

An attacker is scanning wireless netowkrs and sicovers that one of them is set up to support the two most recent protocols. What type of attack is the malicoous actor most likey to launch to try to breach the security settings of the wireless deviec

Downgrade attack

35
New cards

You need to explain to the CEO of a company the differences between symeetric and asymmetric cryptographic algorithms. Which of the following statments are you most likey to convey

ECC is among the better asymmetric cryptographic algorithms.hjo

36
New cards

johnny devlops an app to ecnrpyt short messages. He runs the encrpytion progam, but is designed to deliberatlyey introduce a 5- to 15 second delay before ecnrption begins.

Plaintext

37
New cards

Cadence will attempt to find two different sets of iunput ext that will yeild the same hash when using MD5

Collision attack

38
New cards

Barrabi mined Bitcoin uears ago that is now worth millions of dollars. He encrypted the password but cant remember the key he used to encrypt it. Upon employing the services of barnum, a skilled security professional, he was eventually able to determine the key.

He preformed a cyphertext attack

39
New cards

Alpha and Beta are having a conversation in English Gamma, who is gifted conversationlsit and tends to monopolize conversations, aproaches Alpha and Beta. As soon as Alpha an d BEta see Gama, they start sp[eaking in Spanish but Gmma does not understand.

They employed a form of encryption.Whic

40
New cards

Which of the following statements best describes the critical factor that allows cryptographic algorithms to be effective

The keys used by algorithms must be securely guarded

41
New cards

Ipsec is considered a transparent protocol. Which of the following statments best describes what this means

Programs do no need to be modified to run under IPSec

Users do not need to be trained on specific security procedures

42
New cards

Part of your responsibilities include maintining the root CA as well as intermediate CAs for a large organization

Keep it powered down unti lyou need to issue or reissue certificates

43
New cards

Kuruvilla is looking for a new online game to play. During this exploration the browser gives an indication that there was a network error

OCSP was not able to access the server it was trying to contact.

44
New cards

You want to open an account with an online bank that is paying fiver percent itnerst because othe rbanks are not only paying two percent. You opened a browser and go to bankofutopi but get a little suspicous

Check the digitl certifiate

45
New cards

which of the following is a characteristic that helps determine the strength of a key

Randomness

Cryptoperiod

Key space

46
New cards

A key was revoked before it expired. Xan takes the revoked key out of the revocatio nstate and reactivates it to extract and decrypt old messages from an emai lacrhival systesm.

A revoked key cannot be reinstated

47
New cards

Three entites know and trust eachother completely. In a public key infastrucutre setting, which of the following could b sued to describe htis type of trust

Direct Trust

Web of trust

48
New cards

An employee eas expected to return to work after a three month leave due to personal issues. However, because of additional issues, the leave has been extendedby nin months. What is the possibel action the company could take regarding the employee’s digitalk certificate

Revoke it

Suspend it

49
New cards

Which of the following represents and inprovment made to the current version of TLS outlined in this module

Uses perfect Forward Secrecy for public key-based key exchange

Encrypts handshake messages after the SeverHello exchange

50
New cards

Which of the following statments is true relative to the concept of certifate chaining

The endpoint of a chain is user digital certificate

Root digital certificates are self signed.

51
New cards

Hitee is asked to provide a local entity from which the status of digital certifiates can be viewd.

CR

52
New cards

A security compliance specalist, you are asked to produce CP and CPS documents

A CPS is more technical document than CP

A CP is a set of rules that govern the operation of PKI

53
New cards

Company Beta does some testing on highly anticipated software application and soon installs it in a production enviroment. Problems ensue so they contact Company Alpha, the company who release the software. While investigating the problem, Company Alplha discovers a buffer overflow vulernability. What could have casued it?

Poor coding practices

54
New cards

Jennifer’s computer is infected due to phising scam. Sbased onthe message presented, she is willing to pay in bitcoin to regain access to her compute because she does not want to lose her video productions. Howver, she is having difficult time lauching a broswer to pay the ransom. What type of malware was most likey installed

Blocking ransomware

55
New cards

Pamela installed a program that scanned the interet for coupons. A week later her bank acount was hacked. How was Pamela’s bank account most likey compromised

She installed a computer Trojan

56
New cards

You are serving as a contractor at a company to help harden endpoints. Which of the following could you implement to help achieve the goal

Use a patch management system

Use an application allow listA

57
New cards

A software quality assurance associate is testing two modules in an application on a web server. One module generates fata adn the other reads data. However, whenever data is being generated, as oon as the module that reads data is initiated, the applicatin crashes. Which of the following is most likey to be causing te problem .

Dereferncing a pointer with a NULL value

58
New cards

A company’s network is infected with ransomware. They are told data has been stolen. In addtion, they are told to pay a ransom to decrpy the data on their servers, or the stolen data will be realsed to he public. Which of the following would bethe best option for the company?

There is not best option

59
New cards

What means of protection can be used to help ensure a browsing experience is not susecptible to unauthorized interception of certain elements of the transmission

Use HTTPS

USe secure cookies

60
New cards

Jeffeson downloads a version of PowerShell that is purported to have capabilities that exceed those of the native version. Shortly thereafter his computer starts to exhibit unusual behavior. The installed anti-malware tool does not reavel any

61
New cards

Company Beta does some testing on highly anticipated software application and soon installs it in a productive environment. Problems ensure so they contact Company Alpha, the company who released the software. While investigating the problem, Company Alpha discovers a buffer overflow vulnerability. What could hva caused the vulnerability

Poor coding practices

62
New cards

Jennifer’s computer is infected due to a phisihing scam. Based on the message presented she is willing to pay in Bitcoin to regain acess to her computer because she does not want to lose her video productions. However she is having a difccult time launching a broswer to pay the ransom. What is most likey installed

Blocking ransomware

63
New cards

Pamela installed a progam that scanned the internet for coupons. A week later her bank was hacked. How was pamela’s bank account most likey compromised

She installed a trojan

64
New cards

You are serving as a contractor at a company to help hadren endpoints. which of the following could you implement to help achieve the goal

US a ptach management system

USe an application allow lsit

65
New cards

A software quailty assurance associate is testing two modules in an pplication ona webserver. One module generates data and the oher reads data. However, when data is being generated, as soon as the module that reads data is initiated, the application crashes. Which of teh wfollow is the mostl likey to be causing the problem

Differencing a pointer with a NULL value

66
New cards

A compan’ys network is infected with ransomware. They are told that data has been stolen. In addtion, they are told to pay ransom to decrpy the data on their servers, or the stolen data will be released to the public. Which of the following would be the best option for the company

There is no best option

67
New cards

What means of protection can be used to help ensure a browsing experience is not susceptible to unauthorized interception of certain elements of he transmission.

Use HTTPS

Use secure cookies

68
New cards

Jefferson downloads a version of PowerShell that is purported to have capabilities that exceed those of the native version. Shortly therafter his computer starts to exhibit unusual behavior. the installed ani-malware tool does not reveal anything he does not already know. What type of malware is most likey to be installed on the sysstem

Fileless virus

69
New cards

A malicous actor manages to install a backdoor on a system. What are some of the most likey reasons why they would do this?

For privilege escalation purposes

To circumvent security protections

70
New cards

Florentina is analyzing a network and notices an unusual amount of traffic is being generated by some computer. Additional investigation reveals that most of te traffic is in the form of images being transmitted to an unfamiliar site. What specific type of malware was most likely installed on the compromised systems.

Software keylogger

71
New cards

A ecuirty company is testing an unpactched server running an older OS connected to the internet in an isolated network. However, the antimalware software installed on the server was consistently not able to dectect a particular type of infections. What type of infection was least likey to be dected by the anti-malware app

Rookit

72
New cards

A user sees a message in their broswer that appears to be from the compay whose OS is installed on their computer. IT idplayes a number to call support to fix the problem. When the user calls, the threat actos requirests per mission to install software to scan the system but instead installs a threat agent for late access. WHat ype of malware did the attacker most lieky install.

RAT

73
New cards

Excel is watching a game with friends in a public forum. He is an avid fan and enjoys debating how his favorite player happens to be the best player in the league. Shortly after the game he receives a message on his mobile device with a link purporting to be advertising T-shirts and other merchandise with his favorite player. What may have caused this to happen?

Malware on his phone was engaged in unauthorized recording or listening.


74
New cards

Why has there been a heightened interest by threat actors toward attacking mobile devices?

 

They have access to sensitive data.


75
New cards

A company uses the COPE enterprise deployment model. Every six months they delete outdated sales data from the mobile devices. However, sometimes users submit a help desk ticket to restore personal data that was accidentally deleted. How could this problem be prevented?

 

Use containerization.


76
New cards

For security reasons, an app has the restriction that it can only be used within a one-kilometer radius of a secure facility. What is being used to enforce this restriction?

Geofencing

77
New cards

Which of the following statements represents steps that can be taken to harden SCADA systems? Select two.

 

Disconnect unnecessary connections to the SCADA network.


 

Identify all connections to SCADA networks.


78
New cards

A parent, who is a small business owner, takes their child on a business trip. The child uses the parent's phone during the flight. Unfortunately, the child leaves the phone on the plane, but the parent realizes it after it is too late to retrieve it. What kind of security could have prevented this type of vulnerability?

 

Physical security


79
New cards

A small company decides to adopt the COPE enterprise deployment model and supplies Android devices to its employees. Due to a significant downturn in the economy, they have not upgraded the devices in five years. What should the company do to limit the risk relative to the mobile devices?

 

Replace the devices with newer models.

80
New cards

You work at a very large water treatment facility. Which of the following best describes systems you should secure and harden to help minimize any potential downtime? Select two.

 

ICS systems


 

SCADA systems


81
New cards

An individual places a new USB cable near one of the charging stations at a busy airport. They wait from a nearby distance hoping someone will use the cable. What is the intent of the individual?

 

To send malicious commands to the device.


82
New cards

A commuter sees a flyer on a train with a QR code advertising high interest rates at an online bank. The commuter scans the code, but the website indicates the promotion has ended. Within a few days the commuter's phone starts sending messages to everyone in the contacts with a malicious link. How could this have been prevented?

 

Do not scan QR codes from unfamiliar sources.


83
New cards

Guang buys a mobile device at an Apple store. He wants to harden the device using two strong methods of authentication. Which of the following would you advise Guang to use? Select two.

 

Facial recognition


Password

84
New cards

At a software development company, team Alpha is responsible for static code analysis while team Beta is responsible for dynamic code analysis. Which of the following statements accurately describes the differences or similarities relative to how the teams conduct their analysis? Select two.

 

Dynamic code analysis is performed while the code is running.


 

Static code analysis may include actively examining each line of code visually.


85
New cards

Which of the following are features typically available when enabling loss or theft services on a mobile device? Select two.

 

Ability to remotely erase sensitive data stored on the device.


 

Ability to remotely lock the device.


86
New cards

Jailbreaking an Apple iOS device or rooting on Android devices opens opportunities that allow the user to download and install apps from a larger pool of available sources. What are the risks, if any, associated with this type of activity?

 

Downloaded apps may contain malware that bypass the phone's security.


87
New cards

Anita is visiting a client when she discovers an app that was internally developed is missing from her mobile device. She contacts the home office, and they install the app remotely. What tool most likely provided this capability?

MAMA

88
New cards

As part of your software test engineering role at a corporation, you need to set up a system that generates random input to trigger events such as exceptions, memory corruption, and other security breaches. Which of the following will you deploy? Select two.

 

Dynamic code analysis

 

Fuzzing process


89
New cards

Which of the following statements best describe why it is beneficial to use a RTOS in a SoC?

 

A RTOS can handle very large amounts of data very quickly.


90
New cards

An elderly person withdraws money from an ATM at a bus terminal. They are speaking on their cell phone and overlook retrieving the bank card from the card reader. A malicious actor is watching and steals the card. Unfortunately, the card has a small piece of tape with the PIN. The attacker waits a couple of hours after the elderly person has boarded a bus and goes to the ATM to withdraw money. Even though the elderly person has not yet realized their card is missing, the attacker is unsuccessful. Which of the following most likely thwarted the attacker's intent?

Geolocation

91
New cards

A senior software engineer starts working at a small company that wants to incorporate secure coding practices. Quality assurance currently begins after the application has been tested but before production. The engineer sees an opportunity and recommends adopting a method that breaks down the project into smaller biweekly development "bursts" that include testing. Which of the following statements are true? Select two.

 

The company is currently using the waterfall model.


 

The engineer prefers using the agile model.


92
New cards

Which statement best describes why devices and systems that are optimized to draw very low levels of power lack the ability to perform strong security measures?

 

To preserve battery life.


93
New cards

Which of the following best describes characteristics of embedded systems? Select two.

 

They are designed for a specific function.


 

They are contained within a larger system.


94
New cards

Navana is responsible for implementing a cognitive biometric system to authenticate users at her company. Which one of the following elements will employees need to possess to log in successfully?

 

Something you are


95
New cards

Alexandria works at a secure installation that requires a special ID card with her picture to gain access. An officer at the gate needs to scan the ID card before allowing employees to enter the installation. One day she forgets her card. However, since the officer recognizes her, the officer lets her pass through the gate. Which of the following elements, if any, did the officer violate (not enforce)?

 


 

Something you have


96
New cards

A security audit firm recommends using a technology that will help protect password digests at a corporation. Their recommendation will dramatically reduce the efficiency of password cracking endeavors should the password digest ever be stolen. Which of the following reflects what the security audit firm may have recommended? Select two.

Argon2

 

Key stretching


97
New cards

Pooma is researching the viability of implementing keystroke dynamics to authenticate users. She writes a report highlighting some of the benefits. Which of the following statements is she most likely to include in the report as well as consider in the implementation plan? Select two.

 

It requires no specialized hardware.


 

No additional steps are required beyond entering the username and password.


98
New cards

A mid-sized company requires users to log in using an OTP sent to their smartphone in an SMS text. However, their plan is to replace the current system of authentication and provide everyone with a security key. What would motivate the company to take this action?

 

Because security keys do not generate OTPs.


99
New cards

The letter I in IAM deals with which of the following items? Select two.

 

Identity proofing


 

Authentication


100
New cards

Conrad stores multiple passwords in a user vault file that is protected by one strong password. Features include enhanced encryption and requiring a secret key file to be present when entering the master password to open the vault. Which of the following is Conrad using?

 

Password manager