Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Professional Development

15 Qs

quiz-placeholder

Similar activities

AWS RDS Quiz

AWS RDS Quiz

Professional Development

10 Qs

Exchange with Abdenour Saaid

Exchange with Abdenour Saaid

Professional Development

13 Qs

Cloud Computing-Model Exam-II-PART-B

Cloud Computing-Model Exam-II-PART-B

Professional Development

15 Qs

SEC+ Ch.6 Review Test

SEC+ Ch.6 Review Test

Professional Development

15 Qs

Windows Active Directory

Windows Active Directory

University - Professional Development

19 Qs

SEC+ Ch.9 Review Test

SEC+ Ch.9 Review Test

Professional Development

15 Qs

AZ-900 practice quiz 2

AZ-900 practice quiz 2

Professional Development

15 Qs

Windows Server Active Directory

Windows Server Active Directory

University - Professional Development

18 Qs

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Security+ Study Guide-06 Threats, Vulnerabilities & Common Attac

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Alejandro Hidalgo

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A tech company recently discovered an attack on its organization, resulting in a significant data breach of customer data. After investigating the attack, they realized it was very sophisticated and likely originated from a foreign country.

Which of the following identifies the MOST likely threat actor in this attack?

Hacktivist

APT

Competitors

Insiders

Answer explanation

This was most likely an advanced persistent threat (APT) because it was a sophisticated attack and originated from a foreign country.

A hacktivist launches attacks to further a cause, but the scenario didn’t mention any cause.

Competitors might launch attacks, but they would typically focus on proprietary data rather than customer data.

An insider would not launch attacks from a foreign country.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker purchased an exploit on the internet. He then used it to modify an item's price in an online shopping cart during checkout.

Which of the following BEST describes this attack?

Insider

Script kiddie

Competitor

Hacktivist

APT

Answer explanation

A script kiddie will typically obtain a ready-made exploit rather than code it himself.

An insider would cause damage from within the network or use inside knowledge when attacking.

A competitor is unlikely to purchase a single item at a lower price but would be more interested in gaining proprietary data.

Hacktivists launch attacks as part of an activist movement, not to get a better price on an item.

An advance persistent threat (APT) is typically a state actor sponsored by a nation-state and will use advanced tools to launch sophisticated attacks, rather than just lowering a price of an item.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Lisa is a database administrator. She received a phone call from someone identifying himself as a representative from a known hardware vendor. He said he's calling customers to inform them of a problem with database servers they've sold, but he said the problem only affects servers running a specific operating system version. He asks Lisa what operating system version the company is running on their database servers.

Which of the following BEST describes the tactic used by the caller in this scenario?

Pretexting

Tailgating

Pharming

Smishing

Answer explanation

The caller is using the social engineering tactic of pretexting by setting up a scenario that has a better chance of getting someone to give him information. If he just asked for the operating system versions on the servers without a prepended scenario, his chance of success would be diminished.

Tailgating is the practice of one person following closely behind another without showing credentials.

A pharming attack attempts to manipulate the DNS name resolution process.

Smishing is a form of phishing using text messages.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An attacker recently attacked a web server hosted by your company. After investigating the attack, security professionals determined that the attacker used a previously unknown application exploit.

Which of the following BEST identifies this attack?

Buffer overflow

Zero-day attack

Man-in-the-browser

Integer overflow

Answer explanation

A zero-day attack takes advantage of an undocumented exploit or an exploit that is unknown to the public.

A buffer overflow attack sends unexpected data to a system to access system memory or cause it to crash. Although some buffer overflow attacks are unknown, others are known. If the server isn’t kept up to date with patches, it can be attacked with a known buffer overflow attack.

A man-in-the-browser attack is a type of proxy Trojan horse that takes advantage of vulnerabilities in web browsers, not web servers.

An integer overflow attack attempts to use or create a numeric value that is too big for an application to handle.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

After Bart logged on his computer, he was unable to access any data. Instead, his screen displayed a message indicating that unless he made a payment, his hard drive would be formatted, and he'd permanently lose access to his data.

What does this indicate?

Keylogger

Ransonware

Backdoor

Trojan

Answer explanation

Ransomware attempts to take control of user’s system or data and then demands payment (ransom) to return control.

Keyloggers capture a user’s keystrokes and store them in a file. This file can be automatically sent to an attacker or manually retrieved depending on the keylogger.

It’s possible that Bart’s computer was infected with a Trojan, which created a backdoor. However, not all Trojans or backdoor accounts demand payment as ransom.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Recently, malware on a computer at the Monty Burns Casino destroyed several important files after it detected that Homer was no longer employed at the casino.

Which of the following BEST identifies this walware?

Logic bomb

Rootkit

Backdoor

Spyware

Answer explanation

A logic bomb executes in response to an event. In this scenario, the logic bomb is delivering its payload when it detects that Homer is no longer employed at the company.

A rootkit doesn’t respond to an event.

A backdoor provides another method of accessing a system, but it does not delete files.

Spyware is software installed on user systems without their awareness or consent.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Maggie was on a programming team that developed an application used by your Human Resources department. Personnel use this application to store and manage employee data. Maggie programmed in the ability to access this application with a username and password that only she knows to perform remote maintenance on the application if necessary.

Which of the following does this describe?

Virus

Worm

Backdoor

Trojan

Answer explanation

A backdoor provides someone an alternative way of accessing a system or application, which is what Maggie created in this scenario. It might seem as though she’s doing so with good intentions, but if attackers discover a backdoor, they can exploit it.

A virus is malicious code that attaches itself to an application and executes when the application runs, not code that is purposely written into the application.

A worm is self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.

A Trojan is software that looks like it has a beneficial purpose but includes a malicious component.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?