https://www.udemy.com/course/comptia-security-601-practice-exam-domain-1-5/learn/quiz/6098874#overview
Domain 1 – Threats, Attacks, and Vulnerabilities – Results
Back to result overview
Attempt 2
All domains
- 50 all
- 0 correct
- 0 incorrect
- 50
- 0 marked
Collapse all questions
Question 1
Which of the following terms best describes a type of software that disguises itself as legitimate software but contains malicious code that can compromise the security of a system?
Correct answer
Malware
Ransomware
Adware
Firewall
Overall explanation
A) Malware, short for malicious software, is software designed to infiltrate or damage computer systems while often appearing as legitimate software. It includes various types such as viruses, trojans, and spyware.
Incorrect answers:
B) Ransomware is a specific type of malware that encrypts files and demands a ransom.
C) Adware is unwanted software that displays advertisements but isn’t necessarily disguised as legitimate software.
D) A firewall is a security device used to control incoming and outgoing network traffic, not software that disguises itself.
Question 2
An attacker poses as a delivery person, carrying a package for a company, and convinces an employee to let them into the building. Once inside, the attacker gains unauthorized access to the company’s network. What type of social engineering technique is this?
Correct answer
Tailgating
Pretexting
Phishing
Vishing
Overall explanation
A) Tailgating, also known as piggybacking, involves an attacker following an authorized person into a secure area by appearing as if they belong there.
Incorrect answers:
B) Pretexting involves creating a fabricated scenario to deceive individuals, often over the phone.
C) Phishing typically involves deceptive emails or messages.
D) Vishing is voice-based social engineering, often over the phone.
Question 3
Threat actors who is motivated by financial gain and often uses malicious software to encrypt a victim’s data and demand a ransom is typically referred to as:
A hacktivist
A script kiddie
Correct answer
A cybercriminal
A nation-state actor
Overall explanation
C) Cybercriminals are motivated by financial gain and commonly use ransomware to demand payments from victims.
Incorrect answers:
A) Hacktivists engage in hacking for social or political causes.
B) Script kiddies are individuals with limited hacking skills who often use pre-existing tools.
D) Nation-state actors are affiliated with governments and engage in cyber-espionage or cyberwarfare.
Question 4
Which attack involves flooding a network with ICMP echo request packets sent to a broadcast address?
SYN flood
Correct answer
Smurf attack
DDoS attack
DNS amplification attack
Overall explanation
B) A Smurf attack sends ICMP echo request packets to a network’s broadcast address, causing a flood of replies to the victim’s IP.
Incorrect answers:
A) SYN flood involves overwhelming a server with TCP connection requests, not ICMP echo requests.
C) DDoS involves overwhelming a network or server with traffic from various sources, not specifically ICMP echo requests.
D) DNS amplification involves using DNS servers to flood a victim with DNS response traffic, unrelated to ICMP echo requests.
Question 5
Which of the following best describes the concept of a "zero-day vulnerability"?
A vulnerability that has been in existence for zero days.
A vulnerability that has been exploited for zero days.
Correct answer
A vulnerability that is unknown to the software vendor and has no available patch.
A vulnerability that is at the lowest risk level.
Overall explanation
C) A vulnerability that is unknown to the software vendor and has no available patch.
Incorrect answers:
A) This option does not accurately describe a zero-day vulnerability.
B) A zero-day vulnerability does not refer to the amount of time it has been exploited.
D) The risk level of a vulnerability is not determined by whether it’s a zero-day vulnerability or not.
Question 6
What is a common characteristic of a "man-in-the-middle" (MitM) attack?
Correct answer
The attacker intercepts and alters data between two parties without their knowledge.
The attacker floods a network with excessive traffic to overwhelm it.
The attacker disguises malicious code as legitimate software.
The attacker gains unauthorized access to a system using stolen credentials.
Overall explanation
A) The attacker intercepts and alters data between two parties without their knowledge.
Incorrect answers:
B) Flooding a network with excessive traffic is characteristic of a DoS attack, not a MitM attack.
C) Disguising malicious code as legitimate software is associated with malware, not MitM.
D) Gaining unauthorized access through stolen credentials is typically related to unauthorized access attacks, not MitM.
Question 7
An employee receives an email from what appears to be their company’s IT department. The email requests that the employee reset their email password due to a security breach. The email contains a link to a login page. What kind of threat is the employee facing?
Correct answer
Phishing attack
Insider threat
Man-in-the-middle attack
Ransomware attack
Overall explanation
A) This scenario describes a phishing attack. Phishing is a type of attack where attackers impersonate trusted entities to trick individuals into revealing sensitive information, often by luring them to fake login pages.
Incorrect answers:
B) An insider threat typically involves an organization’s own employees posing a security risk.
C) A man-in-the-middle attack intercepts and alters data in transit, not password reset requests.
D) Ransomware doesn’t involve password reset requests but encrypting files and demanding a ransom.
Question 8
A security administrator has noticed several unauthorized access attempts to the organization’s internal systems. These attempts are often based on trying common username and password combinations. Which type of attack does this scenario most likely describe?
SQL injection attack
Correct answer
Brute-force attack
DDoS attack
Cross-site scripting (XSS) attack
Overall explanation
B) The scenario describes a brute-force attack where an attacker attempts to gain access by trying many possible username and password combinations. This is a common method used to crack passwords.
Incorrect answers:
A) SQL injection attacks involve manipulating a database’s queries.
C) DDoS attacks flood a network to make it unavailable, not necessarily related to unauthorized access.
D) Cross-site scripting attacks target web applications and don’t typically involve trying username/password combinations.
Question 9
A company’s network administrator has discovered a new piece of software running on one of the company’s servers. The software was not installed by the IT department and is not part of the approved software list. What type of threat is this scenario indicating?
Insider threat
Ransomware attack
Correct answer
Trojan horse
Spear-phishing attack
Overall explanation
C) This scenario suggests the presence of a Trojan horse, which is a type of malware that disguises itself as legitimate software but has malicious intent. It is often installed by an attacker.
Incorrect answers:
A) An insider threat usually involves employees with malicious intent or negligence.
B) Ransomware is specific malware that encrypts files and demands a ransom.
D) Spear-phishing involves targeted emails to deceive individuals, not installing unauthorized software.
Question 10
Which attack aims to manipulate a website to redirect users to a fraudulent site that appears legitimate to steal their information?
SQL injection
Cross-Site Scripting (XSS)
Correct answer
DNS spoofing
URL hijacking
Overall explanation
C) DNS spoofing manipulates the DNS records to redirect users to a fraudulent site, typically appearing legitimate, intending to steal their information.
Incorrect answers:
A) SQL injection involves manipulating databases, not site redirection.
B) XSS involves injecting malicious scripts into a website, but not site redirection specifically.
D) URL hijacking is not a well-defined term within cybersecurity.
Question 11
An employee has lost their company-issued smartphone, and it contained sensitive corporate data. What kind of threat does this scenario illustrate?
Phishing attack
Insider threat
Correct answer
Physical security breach
Ransomware attack
Overall explanation
C) The scenario illustrates a physical security breach where the loss of a device (in this case, a smartphone) leads to the potential exposure of sensitive data.
Incorrect answers:
A) Phishing attacks involve deceptive communication to obtain information, not the loss of a device.
B) An insider threat typically involves employees with malicious intent or negligence, not device loss.
D) Ransomware involves the encryption of files and a demand for a ransom, not device loss.
Question 12
A network administrator has implemented a firewall rule that allows only specific incoming traffic from trusted IP addresses and denies all other incoming traffic. What security principle does this rule exemplify?
Correct answer
Principle of least privilege
Defense in depth
Zero trust
Security by design
Overall explanation
A) The firewall rule aligns with the principle of least privilege, where access is restricted to only what is necessary for users or systems to perform their functions.
Incorrect answers:
B) Defense in depth involves multiple layers of security controls.
C) Zero trust is a concept of not inherently trusting any user or system, requiring verification.
D) Security by design is about incorporating security from the beginning of system development.
Question 13
An organization has implemented a policy that requires regular patching of software and systems to address known vulnerabilities. What security practice does this policy reflect?
Security through obscurity
Correct answer
Vulnerability management
Least privilege
Zero-day exploitation
Overall explanation
B) The policy reflects the practice of vulnerability management, which involves identifying, prioritizing, and addressing known vulnerabilities in software and systems.
Incorrect answers:
A) Security through obscurity relies on the secrecy of system design rather than addressing known vulnerabilities.
C) Least privilege is about providing minimum necessary access to perform tasks.
D) Zero-day exploitation is when attackers target vulnerabilities not yet known to the vendor, in contrast to this policy which deals with known vulnerabilities.
Question 14
A company is conducting a security audit and penetration testing on its network to identify and rectify vulnerabilities before malicious actors can exploit them. What security practice is this organization following?
Incident response
Correct answer
Security assessment
Security awareness training
Least privilege
Overall explanation
B) The organization is conducting a security assessment, specifically penetration testing, to identify and rectify vulnerabilities in its network.
Incorrect answers:
A) Incident response is the process of managing and mitigating security incidents.
C) Security awareness training is about educating employees on security best practices.
D) Least privilege is about providing minimum necessary access to perform tasks, not assessing vulnerabilities.
Question 15
An organization has set up a dedicated network segment for guest wireless access, which is isolated from its internal network. What security principle does this network segmentation align with?
Principle of least privilege
Defense in depth
Correct answer
Network segmentation
Security by design
Overall explanation
C) Network segmentation is the practice of dividing a network into isolated segments to enhance security by controlling access and limiting the potential for lateral movement by attackers.
Incorrect answers
A) The principle of least privilege focuses on providing minimum necessary access to perform tasks.
B) Defense in depth involves multiple layers of security controls.
D) Security by design emphasizes incorporating security from the beginning of system development.
Question 16
A company’s web application was recently compromised, and customer data was stolen. The company’s cybersecurity team discovers that the attackers exploited a vulnerability in the application’s code to gain unauthorized access. What type of attack is this?
Correct answer
SQL injection attack
Man-in-the-middle attack
Cross-site scripting (XSS) attack
Zero-day vulnerability
Overall explanation
A) The scenario describes an SQL injection attack, where attackers exploit vulnerabilities in web application code to gain unauthorized access to a database.
incorrect Answers:
B) A man-in-the-middle attack intercepts and alters data in transit but doesn’t necessarily involve web application vulnerabilities.
C) Cross-site scripting attacks target web applications but involve injecting malicious scripts into web pages.
D) A zero-day vulnerability is a software vulnerability that is unknown to the vendor, not necessarily related to unauthorized access.
Question 17
An organization’s security team regularly reviews and assesses logs generated by its servers and network devices to detect and investigate security incidents. What security practice does this represent?
Security awareness training
Correct answer
Log analysis and review
Data classification
Security policy enforcement
Overall explanation
B) Regularly reviewing and analyzing logs is a key practice in identifying and responding to security incidents and potential threats.
Incorrect answers:
A) Security awareness training focuses on educating employees on security best practices.
C) Data classification is the process of categorizing data based on its sensitivity.
D) Security policy enforcement involves ensuring that security policies are followed and enforced.
Question 18
An attacker calls an employee, pretending to be a colleague from another department, and requests sensitive information to complete a report. What type of social engineering technique is this?
Correct answer
Impersonation
Tailgating
Phishing
Vishing
Overall explanation
A) Impersonation involves pretending to be someone the target knows and trusts to manipulate them into disclosing sensitive information.
Incorrect answers:
B) Tailgating involves physical security breaches.
C) Phishing typically uses deceptive emails or messages.
D) Vishing involves voice communication, usually over the phone.
Question 19
Which type of attack involves the modification or interception of communication between two parties without their knowledge?
Correct answer
Man-in-the-Middle (MitM)
Buffer overflow
Spoofing
Zero-day exploit
Overall explanation
A) MitM attacks intercept and manipulate communications between two parties without their awareness, allowing attackers to eavesdrop or modify data.
Incorrect answers:
B) Buffer overflows are software memory vulnerabilities, not related to intercepting communications.
C) Spoofing involves falsifying data to appear as something it’s not but doesn’t necessarily involve communication interception.
D) Zero-day exploits target newly discovered vulnerabilities and are not specific to communication interception.
Question 20
An attacker, aware of recent security audits at the company, calls employees, claiming to be a security auditor conducting routine checks. The attacker asks for login credentials and access to the company’s network to perform a "security check." What type of social engineering technique is this?
Phishing
Spear-phishing
Correct answer
Vishing
Tailgating
Overall explanation
C) Vishing is a social engineering technique that involves voice communication, typically over the phone, to manipulate individuals into revealing sensitive information or granting access.
Incorrect answers:
A) Impersonation typically involves impersonating someone the target knows and trusts.
B) Spear-phishing is a more targeted form of phishing.
D) Tailgating involves physically following someone into a secure area.
Question 21
During a penetration test, the tester attempts to gain unauthorized access to a system by exploiting known vulnerabilities without any prior knowledge of the target. What type of penetration testing technique is this?
White-box testing
Correct answer
Black-box testing
Gray-box testing
Vulnerability scanning
Overall explanation
B) Black-box testing is a type of penetration testing where the tester has no prior knowledge of the target system and attempts to find and exploit vulnerabilities.
Incorrect answers:
A) White-box testing involves testing with full knowledge of the target system.
C) Gray-box testing is a mix of both white-box and black-box testing.
D) Vulnerability scanning is a process of identifying and classifying vulnerabilities but not
Question 22
A penetration tester uses a vulnerability scanner to identify known security issues in a target system. What phase of the penetration testing process does this action belong to?
Scoping
Information gathering
Correct answer
Vulnerability analysis
Exploitation
Overall explanation
C) Using a vulnerability scanner to identify known security issues falls under the vulnerability analysis phase of penetration testing.
Incorrect answers:
A) Scoping is the initial phase that defines the scope and objectives of the test.
B) Information gathering involves collecting data about the target system.
D) Exploitation is the phase where vulnerabilities are actively exploited.
Question 23
Which attack involves a flood of connection requests with falsified IP addresses to overwhelm a server?
Correct answer
SYN Flood
DDoS Attack
Man-in-the-Middle (MitM)
DNS Spoofing
Overall explanation
A) SYN Flood overwhelms a server with connection requests using falsified or spoofed IP addresses, consuming resources and rendering the server unavailable.
Incorrect answers:
B) DDoS involves overwhelming a network or server with traffic from various sources, not specifically with connection requests.
C) MitM involves intercepting and modifying communication but does not specifically involve overwhelming a server with requests.
D) DNS Spoofing manipulates DNS records to redirect users, not specifically overwhelming a server with connection requests.
Question 24
In a penetration test, tools and techniques are used to mimic an attacker trying to gain unauthorized access to a target system. What type of penetration testing is this?
Correct answer
Red teaming
Blue teaming
Social engineering testing
Passive testing
Overall explanation
A) Red teaming involves mimicking the actions of an attacker to evaluate the effectiveness of a system’s defenses.
Incorrect answers:
B) Blue teaming is a defensive exercise that evaluates a system’s security.
C) Social engineering testing focuses on manipulating human behavior.
D) Passive testing does not actively simulate attacks.
Question 25
A security analyst discovers that a particular application does not properly manage its memory allocations, which can lead to data corruption and potentially execute arbitrary code. What potential application attack indicator is this situation most likely related to?
Correct answer
Buffer overflows
Race conditions
Error handling
Improper input handling
Overall explanation
A) Buffer overflows occur when an application writes data beyond the allocated memory, potentially leading to data corruption and code execution.
Incorrect answers:
B) Race conditions are related to timing and concurrency issues.
C) Error handling issues typically involve how an application responds to errors.
D) Improper input handling usually relates to data validation.
Question 26
An attacker intercepts a legitimate user’s request and resends it multiple times to manipulate the application into performing unintended actions. What potential application attack indicator does this situation most likely represent?
Correct answer
Replay attack
Integer overflow
Request forgeries
Memory leak
Overall explanation
A) In a replay attack, an attacker intercepts and resends legitimate requests to manipulate the application into performing unintended actions.
Incorrect answers:
B) Integer overflow is related to numerical values exceeding their limits.
C) Request forgeries involve tricking users into making unwanted requests.
D) Memory leak relates to memory management issues.
Question 27
Which of the following threat vectors involves tricking individuals into revealing sensitive information or performing actions that compromise security?
Malware
Correct answer
Social engineering
Distributed denial of service (DDoS)
Zero-day exploits
Overall explanation
B) Social engineering involves manipulating individuals to reveal sensitive information or perform actions against their best interests.
Incorrect answers:
A) Malware refers to malicious software.
C) DDoS is a type of attack that overwhelms a system with traffic.
D) Zero-day exploits are attacks that target vulnerabilities unknown to the software vendor.
Question 28
An organization has implemented strong encryption to protect sensitive data at rest and in transit. What security measure does this scenario represent?
Security awareness training
Data classification
Data in transit protection
Correct answer
Data protection mechanisms
Overall explanation
D) The use of strong encryption is a data protection mechanism that safeguards data at rest and in transit.
Incorrect answers:
A) Security awareness training is about educating employees on security best practices.
B) Data classification is the process of categorizing data based on its sensitivity.
C) Data in transit protection refers to safeguarding data while it is being transmitted, not at rest.
Question 29
A small business recently conducted a vulnerability scan on its network and found multiple weaknesses in its web server, leaving it susceptible to SQL injection attacks. What should be the immediate response to address these vulnerabilities?
Consider upgrading the network infrastructure to mitigate the vulnerabilities.
Perform another vulnerability scan to verify the findings and their severity.
Correct answer
Implement security measures or patches to fix the SQL injection vulnerabilities.
Ignore the vulnerabilities as they may not pose an immediate threat.
Overall explanation
C) Upon discovering SQL injection vulnerabilities in the web server, the immediate response should involve implementing security measures or patches to fix these vulnerabilities and enhance security.
Incorrect answers:
A) Upgrading the network infrastructure might be a long-term solution, but immediate patching is necessary to mitigate the identified vulnerabilities.
B) While verifying findings is helpful, delaying action could lead to potential exploitation.
D) Ignoring known vulnerabilities can leave systems exposed to attacks.
Question 30
A type of threat vector that involves exploiting previously unknown vulnerabilities in software is commonly known as:
Malware
Social engineering
Distributed denial of service (DDoS)
Correct answer
Zero-day exploits
Overall explanation
D) Zero-day exploits target vulnerabilities that are unknown to the software vendor and have not yet been patched.
Incorrect answers:
A) Malware refers to malicious software.
B) Social engineering involves manipulating individuals to reveal sensitive information.
C) DDoS is a type of attack that overwhelms a system with traffic.
Question 31
An organization’s website has been receiving an unusually high volume of web traffic, which has made the site unresponsive. The traffic appears to be coming from various sources and seems to be overloading the server. What type of attack is this scenario indicating?
Phishing attack
Man-in-the-middle attack
Correct answer
Denial of Service (DoS) attack
Ransomware attack
Overall explanation
C) The scenario describes a Denial of Service (DoS) attack, where attackers flood a server or network with excessive traffic to make services unavailable to legitimate users.
Incorrect Answers:
A) Phishing attack
B) Man-in-the-middle attack
D) Ransomware attack
Question 32
Which of the following best describes a security concern associated with SQL injection vulnerabilities?
Correct answer
Unauthorized disclosure of sensitive data
Unauthorized access to system resources
Buffer overflows leading to system crashes
Denial of service (DoS) attacks
Overall explanation
A) SQL injection vulnerabilities can lead to unauthorized disclosure of sensitive data stored in a database.
Incorrect answers:
B) Unauthorized access to system resources is not typically the primary concern of SQL injection.
C) Buffer overflows are related to a different type of vulnerability.
D) Denial of service (DoS) attacks are not a direct result of SQL injection.
Question 33
An organization has recently implemented a policy requiring employees to change their passwords every 90 days. What security principle does this policy align with?
Least privilege
Security through obscurity
Password complexity
Correct answer
Password expiration
Overall explanation
D) Password expiration is a security principle that ensures passwords are regularly changed, reducing the risk of unauthorized access due to long-term exposure.
Incorrect answers:
A) Least privilege is about providing minimum necessary access to perform tasks.
B) Security through obscurity is the practice of relying on the secrecy of system design as a security measure, not password changes.
C) Password complexity refers to requiring strong, complex passwords.
Question 34
What is a common security concern associated with cross-site request forgery (CSRF) vulnerabilities?
Correct answer
Unauthorized data modification
Unauthorized access to system resources
Injection of malicious code into web pages
Denial of service (DoS) attacks
Overall explanation
A) CSRF vulnerabilities can lead to unauthorized data modification when an attacker tricks a user into performing unwanted actions.
Incorrect answers:
B) Unauthorized access to system resources is not the primary concern of CSRF.
C) Injection of malicious code into web pages is related to other vulnerabilities.
D) Denial of service (DoS) attacks are not typically associated with CSRF.
Question 35
Which of the following encryption algorithms is considered the most secure and widely used for securing internet communications?
DES (Data Encryption Standard).
Correct answer
AES (Advanced Encryption Standard).
RSA (Rivest-Shamir-Adleman).
MD5 (Message Digest Algorithm 5).
Overall explanation
B) AES (Advanced Encryption Standard).
Incorrect answers:
A) DES (Data Encryption Standard): DES is an older encryption standard and is not considered secure for internet communications.
C) RSA (Rivest-Shamir-Adleman): RSA is an asymmetric encryption algorithm used for key exchange and digital signatures but is not typically used for bulk data encryption on the internet.
D) MD5 (Message Digest Algorithm 5): MD5 is a cryptographic hash function, not an encryption algorithm, and is no longer considered secure for many purposes.
Question 36
In a recent high-profile cybersecurity incident, attackers targeted a multinational corporation’s executive team with personalized emails, tricking them into revealing sensitive company data and financial information. What type of attack is this scenario describing?
Ransomware attack
Correct answer
Whaling attack
Spear-phishing attack
DDoS attack
Overall explanation
B) This scenario describes a whaling attack, where high-ranking individuals within an organization are targeted with personalized emails to deceive them into revealing sensitive information.
Incorrect answers:
A) Ransomware attack: Ransomware typically involves encrypting data and demanding a ransom for decryption.
C) Spear-phishing attack: While similar to whaling, spear-phishing can target a broader range of individuals.
D) DDoS attack: DDoS attacks aim to disrupt services by overwhelming them with traffic.
Question 37
An organization uses biometric authentication methods, such as fingerprint scanning, to grant access to highly secure areas. What security practice does this represent?
Multi-factor authentication
Security through obscurity
Correct answer
Physical security measures
Security awareness training
Overall explanation
C) Using biometric authentication for physical access control is a physical security measure to restrict access to highly secure areas.
Incorrect answers:
A) Multi-factor authentication involves using two or more factors to authenticate users, such as something they know and something they have.
B) Security through obscurity relies on the secrecy of system design.
D) Security awareness training focuses on educating employees on security best practices.
Question 38
A security researcher discovered that a popular social media website had been compromised by attackers. The attackers had injected malicious code into the site, which infected the devices of users who visited the compromised pages. What type of attack is this scenario describing?
Ransomware attack
Correct answer
Watering hole attack
Typosquatting attack
Spear-phishing attack
Overall explanation
B) This scenario describes a watering hole attack, where attackers compromise a legitimate website that their intended victims frequently visit, infecting visitors’ devices with malware.
Incorrect answers:
A) Ransomware typically involves encrypting data and demanding a ransom for decryption.
C) Typosquatting involves deceiving users by using domain names with typographical errors, not compromising websites.
D) Spear-phishing involves targeted deceptive emails, not compromising websites.
Question 39
An attacker rummages through the company’s trash bins, searching for discarded documents, invoices, and other materials that might contain sensitive information. What kind of physical security threat does this scenario illustrate?
Correct answer
Dumpster diving
Social engineering attack
Shoulder surfing
Physical intrusion
Overall explanation
A) This scenario depicts a dumpster diving attack, where an attacker searches through trash or discarded materials to obtain sensitive information.
Incorrect answers:
B) Social engineering involves manipulating individuals into revealing confidential information.
C) Shoulder surfing is the act of spying on someone’s screen or keyboard to capture sensitive information.
D) Physical intrusion typically involves unauthorized entry into a secure facility or area, not searching through trash.
Question 40
A company’s security team discovered that a group of hackers had been scanning the organization’s network and systems, attempting to find vulnerabilities that could be exploited. This prelude to an attack is a classic example of which cybersecurity activity?
Intrusion detection
Dumpster diving
Correct answer
Reconnaissance
Encryption
Overall explanation
C) The scenario describes the reconnaissance phase, where attackers gather information about potential targets and vulnerabilities to prepare for an attack.
Incorrect answers:
A) Intrusion detection: Intrusion detection involves identifying and responding to unauthorized access or malicious activities after an attack has started.
B) Dumpster diving: Dumpster diving involves searching through discarded materials for sensitive information, which is a physical security threat.
D) Encryption: Encryption is a security measure used to protect data, not an activity related to pre-attack planning.
Question 41
Which attack involves falsifying the origin of an email to make it appear as though it’s from a trusted source?
Smurf attack
Phishing
Correct answer
Spoofing
Zero-day exploit
Overall explanation
C) Spoofing involves altering information to appear as if it comes from a legitimate source, commonly seen in email addresses to deceive recipients.
Incorrect answer:
A) A smurf attack involves amplifying a network to overwhelm it with ICMP echo request packets.
B) Phishing uses deceptive tactics but doesn’t necessarily involve falsifying the email’s source.
D) Zero-day exploits target newly discovered vulnerabilities, not email falsification.
Question 42
What could be a potential indicator of a brute force attack on a network?
Rapid increase in legitimate traffic
Correct answer
Repeated login attempts with different credentials
Decrease in CPU usage on the server
Increase in available system resources
Overall explanation
B) A brute force attack involves repeated attempts to gain unauthorized access by trying various login credentials, which could be a potential indicator of this attack.
Incorrect answers:
A) Brute force attacks do not necessarily lead to an increase in legitimate traffic.
C) A decrease in CPU usage might not directly indicate a brute force attack.
D) A brute force attack would unlikely cause an increase in available system resources.
Question 43
Which could be an indicator of a DNS amplification attack on a network?
Decrease in DNS response traffic
Multiple DNS requests from legitimate users
Correct answer
Increase in network latency
Unchanged DNS server configurations
Overall explanation
C) DNS amplification attacks often cause an increase in network latency due to the flood of response traffic generated by the attacker.
Incorrect answers:
A) DNS amplification attacks typically cause an increase, not a decrease, in response traffic.
B) This might not directly indicate a DNS amplification attack as legitimate users can generate multiple DNS requests.
D) DNS server configurations might remain unchanged even during an attack.
Question 44
What could be a potential indicator of an ARP poisoning attack on a network?
A decrease in ARP cache discrepancies
Correct answer
Increased network broadcast traffic
Consistent and stable ARP table entries
Reduced network response times
Overall explanation
B) ARP poisoning attacks often generate increased network broadcast traffic due to the manipulation of ARP requests and replies.
Incorrect answers:
A) ARP poisoning typically introduces ARP cache discrepancies rather than decreasing them.
C) ARP poisoning can manipulate ARP table entries, causing inconsistencies rather than stable entries.
D) ARP poisoning doesn’t necessarily lead to reduced response times but can increase network latency.
Question 45
What is a risk associated with the use of default configurations on devices and applications?
Improved security through standardization
Decreased exposure to known vulnerabilities
Correct answer
Increased susceptibility to unauthorized access
Enhanced protection against phishing attacks
Overall explanation
C) Default configurations are often widely known and exploited, increasing the risk of unauthorized access if not modified.
Incorrect answers:
A) Default configurations do not inherently improve security but provide a starting point that should be modified for better security.
B) Default configurations often increase exposure to known vulnerabilities.
D) Default configurations do not necessarily protect against phishing attacks.
Question 46
In a busy coffee shop, customers connect to the public Wi-Fi network named "FreeCoffeeShopWiFi." An attacker sets up a similar-looking access point named "FreeCoffeeShop_WiFi" to intercept traffic. What type of wireless attack is this scenario an example of?
Rogue access point attack
Correct answer
Evil twin attack
De-authentication attack
Packet sniffing attack
Overall explanation
B) This scenario depicts an evil twin attack where an attacker sets up an unauthorized Wi-Fi access point with a name similar to the legitimate network, aiming to intercept and collect users’ data.
Incorrect answers:
A) Rogue access point attacks involve unauthorized access points but not necessarily mimicking legitimate ones.
C) De-authentication attacks involve disconnecting devices from networks, not creating fake access points.
D) Packet sniffing attacks involve intercepting and monitoring network communication.
Question 47
At a business conference, an attendee discovers their Bluetooth-enabled device has received unsolicited business card data from an unknown source. What kind of wireless attack might this scenario indicate?
Correct answer
Bluejacking attack
Man-in-the-middle attack
Wardriving attack
Bluesnarfing attack
Overall explanation
A) This scenario indicates a Bluejacking attack, where unsolicited messages or business card data is sent to Bluetooth-enabled devices without the users’ consent.
Incorrect answers:
B) A man-in-the-middle attack involves intercepting communication between two parties.
C) Wardriving involves searching for Wi-Fi networks while driving.
D) Bluesnarfing involves unauthorized access to data on a Bluetooth-enabled device.
Question 48
In a public library, a hacker placed a device to capture wireless network traffic, allowing them to collect login credentials and personal information from users connecting to the library’s public Wi-Fi. What kind of wireless attack does this scenario represent?
Correct answer
Packet sniffing attack
Evil twin attack
Rogue access point attack
Wardriving attack
Overall explanation
A) This scenario describes a packet sniffing attack, where a device captures and analyzes wireless network traffic, enabling the theft of sensitive user information.
Incorrect answers:
B) Evil twin attacks involve creating fake access points to intercept data.
C) Rogue access point attacks involve unauthorized access points.
D) Wardriving is the act of searching for Wi-Fi networks while driving.
Question 49
During a network security assessment, the scanning tool flags an outdated software version as a high-severity risk. After manual investigation, it’s revealed that the software’s vulnerability has been patched. What type of detection is this likely to be?
Correct answer
False positive
False negative
True positive
True negative
Overall explanation
A) In this scenario, the scanning tool misidentifies the patched vulnerability as a high-severity risk, indicating a false positive.
Incorrect answer:
B) A false negative would involve missing an actual vulnerability, not an already patched one.
C) True positive indicates correctly identifying an actual vulnerability.
D) True negative denotes accurately identifying the absence of a vulnerability.
Question 50
In a routine vulnerability scan, the security tool fails to detect an unpatched system vulnerability, thereby missing a potential security threat. What type of detection is this likely to be?
False positive
Correct answer
False negative
True positive
True negative
Overall explanation
B) Failing to detect an actual vulnerability, leading to a missed potential security threat, signifies a false negative in the vulnerability scan.
Incorrect answers:
A) False positives involve incorrect identification of non-existent vulnerabilities.
C) True positives indicate accurately identified vulnerabilities.
D) True negatives represent accurately identified absence of vulnerabilities.