Security+ Study Guide-07 Protecting Against Advanced Attacks

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 5+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
An IDS has sent multiple alerts in response to increased traffic. Upon investigation, you realize it is due to a spike in network traffic from several sources. Assuming this is malicious, which of the following is the MOST likely explanation?
An ARP poisoning attack
A DNS poisoning attack
A domain hijacking attack
A DDoS attack
Answer explanation
A distributed denial-of-service (DDoS) attack causes spikes in network traffic as multiple systems attempt to connect to a server and deplete the target’s resources.
An Address Resolution Protocol (ARP) poisoning attack attempts to mislead systems about the source media access control (MAC) address.
A Domain Name System (DNS) poisoning attack attempts to redirect web browsers to malicious URLs.
In a domain hijacking attack, an attacker changes a domain name registration without permission from the owner.
2.
MULTIPLE CHOICE QUESTION
45 sec • 2 pts
While investigating performance issues on a web server, you verified that the CPU usage was about 10 percent five minutes ago. However, it now shows that the CPU usage has been averaging 98 for the last two minutes.
Which of the following BEST describes what this web server is experiencing?
Resource exhaustion
DDoS
A buffer overflow attack
A memory leak
Answer explanation
CPU usage averaging 98 percent indicates resource exhaustion. The scenario doesn’t indicate the cause of the increased usage, so resource exhaustion is the best answer.
A distributed denial-of-service (DDoS) attack could cause this. However, a surge in traffic from an effective marketing campaign sent via email could also cause a surge in resource usage.
A buffer overflow attack is a type of DDoS attack, but the scenario doesn’t give enough information to indicate a buffer overflow attack has taken place.
The scenario only mentions CPU usage, so there isn’t any indication of a memory leak.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An administrator regularly connects to a server using SSH without any problems. Today, he sees a message similar to the following graphic when he connects to the server.
Which of the following is the MOST likely reason for this message?
Rogue access point
On-path attack
MAC flodding
ARP poisoning
Answer explanation
The message indicates a potential man-in-the-middle (MITM) attack, which is also known as an on-path attack. Specifically, it indicates that the key on the host system has changed, which may be due to the administrator connecting to the MITM system instead of the target system.
None of the other answers are related to incorrect cryptographic keys. A rogue access point is an unauthorized wireless access point.
Media access control (MAC) flooding is an attack on a switch, attempting to overload it with different MAC addresses.
An Address Resolution Protocol (ARP) poisoning attack misleads computers or switches about a system’s actual MAC address.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Homer complains that his system started acting erratically today. You discover that malware infected his system, but you discover he didn't open any email during the day. He mentions that he has been browsing the Internet all day.
Which of the following could you check to see where the malware MOST likely originated?
Web server logs
Mail server logs
PowerShell logs
DNS server logs
Answer explanation
Domain Name System (DNS) logs will record DNS queries, such as what hostnames it resolved to IP addresses. The log entries would show all the domains that Homer visited during the day. One of these is most likely the one that downloaded malware onto his system.
A web server would show activity on the web server, but you wouldn’t have access to web servers controlled by others.
Homer didn’t open any email, so the mail server logs wouldn’t help.
PowerShell logs may show activity, but only if the malware used PowerShell. However, the PowerShell logs are unlikely to show who ran PowerShell scripts.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
While reviewing logs for a web application, a security analyst notices that it was crashed several times, reporting a memory error. Shortly after it crashes, the logs show malicious code that isn't part of a known application.
Which of the following is MOST likely occurring?
Buffer overflow
ARP poisoning
Privilege escalation
Replay
Answer explanation
Buffer overflow attacks often cause an application to crash and expose system memory. Attackers then write malicious code into the exposed memory and use different techniques to get the system to run this code. None of the other attacks insert malicious code into memory.
An Address Resolution Protocol (ARP) poisoning attack attempts to mislead systems about the source media access control (MAC) address.
Privilege escalation techniques attempt to give an attacker more rights and permissions.
In a replay attack, the attacker intercepts data and typically attempts to use the intercepted data to impersonate a user or system.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Web developers are implementing error handling in a database application accessed by a web browser.
Which of the following would be the BEST way to implement this?
Display a detailed error message but log generic information on the error
Display a generic error message but log detailed information on the error
Display a generic error message and log generic information on the error
Display a detailed error message and log detailed information on the error
Answer explanation
You should display a generic error message but log detailed information on the error.
Detailed error messages to the user are often confusing to them and give attackers information they can use against the system.
Logging generic information makes it more difficult to troubleshoot the problem later.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A web developer is adding input validation techniques to a website application.
Which of the following should the developer implement during this process?
Validation on the server-side
Validation on the client-side
Normalization techniques
Memory management techniques
Answer explanation
At a minimum, input validation should be performed on the server-side.
Client-side validation can be combined with server-side validation, but attackers can bypass client-side input validation if it is used alone.
Normalization techniques organize tables and columns in a database to reduce redundant data but have nothing to do with input validation.
Memory management is a secure coding technique that helps prevent memory errors.
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
Cycle 4: Session 9 Review.

Quiz
•
Professional Development
20 questions
ANOVISION ROUND 2

Quiz
•
Professional Development
10 questions
HND-CN01

Quiz
•
Professional Development
15 questions
SEC+ Ch.7 Review Test

Quiz
•
Professional Development
14 questions
AZ-900 Module 1

Quiz
•
1st Grade - Professio...
18 questions
Application/Service Attacks

Quiz
•
KG - Professional Dev...
11 questions
JavaScript

Quiz
•
Professional Development
10 questions
การโปรแกรมคอมพิวเตอร์บนอุปกรณ์พกพา Unit 1

Quiz
•
University - Professi...
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development