1. In the CIA Triad, "Confidentiality" means ensuring that data is:
Answers
·
accurate and was not tampered with.
·
available and that people can access
it.
·
not accessible by unwanted
parties.
·
accessible anonymously.
Explanation: When discussing the CIA Triad, "Confidentiality"
refers to the process of ensuring that material is kept secret and that only
authorized persons are able to access it. Protecting sensitive information from
being accessed or disclosed in an unauthorized manner is a part of it. To
protect the privacy of sensitive information, it is common practice to use
precautions such as encoding, access limits, and encrypted communication
methods.
2. In the CIA Triad,
"Integrity" means ensuring that data is:
Answers
·
available and that people can access
it.
·
truthful and honest.
·
accurate and was not
tampered with.
·
not accessible by unwanted parties.
Explanation: In the context of the CIA Triad, "integrity"
refers to the process of ensuring that data does not lose its accuracy,
consistency, or integrity while being stored, transmitted, or processed. It
entails safeguarding data from illegal alterations or tampering, as well as
ensuring that information continues to be reliable and trustworthy. Data
checksums, hashing, and access control are some of the most frequent methods
that are used while attempting to maintain the data's integrity.
3. In the CIA Triad,
"Availability" means ensuring that data is:
Answers
·
available to anyone from anywhere.
·
available and people can
access it.
·
not accessible by unwanted parties.
·
accurate and was not tampered with.
Explanation: In the context of the CIA Triad, "integrity"
refers to the process of ensuring that data does not lose its accuracy,
consistency, or integrity while being stored, transmitted, or processed. It
entails safeguarding data from illegal alterations or tampering, as well as
ensuring that information continues to be reliable and trustworthy. Data
checksums, hashing, and access control are some of the most frequent methods
that are used while attempting to maintain the data's integrity.
4. What's the
relationship between a vulnerability and an exploit?
Answers
·
An exploit creates a vulnerability in
a system.
·
An exploit takes advantage
of a vulnerability to run arbitrary code or gain access.
·
They’re unrelated.
·
A vulnerability takes advantage of an
exploit to run arbitrary code or gain access.
Explanation: Consider a vulnerability to be a weakness or fault in the
design, implementation, or configuration of a system that has the potential to
be exploited by an attacker. Now, an exploit is the specific instrument,
strategy, or procedure that is used in order to take advantage of a
vulnerability.
It's the same as having a gaping hole in the side of the
building (a vulnerability), and an exploit is the method by which someone
specifically breaches that gap. Therefore, flaws are referred to as
vulnerabilities, and exploits are the elements that turn vulnerabilities into a
problem.
5. Which statement is
true for both a worm and a virus?
Answers
·
They infect other files with malicious
code.
·
They’re self-replicating
and self-propagating.
·
They don’t cause any harm to the
target system.
·
They’re undetectable by antimalware
software.
Explanation: Both worms and viruses are intended to multiply and
propagate, and they may be harmful to a system in a variety of ways, including
infecting files, taking advantage of weaknesses, or interfering with the way
the system normally functions.
6. Check all examples of
types of malware:
Answers
·
Adware
·
Viruses
·
Worms
·
Key Generators
7. What are the
characteristics of a rootkit? Check all that apply.
Answers
·
Is harmless
·
Is difficult to detect
·
Is destructive
·
Provides elevated
credentials
8. A person at a coffee
shop leaves a laptop logged in with a token and walks away for a short time. An
attacker goes to the laptop and starts impersonating the laptop’s user on the
website the user is logged into. What kind of attack is this?
Answers
·
A ransomware attack.
·
A rogue AP attack
·
A session hijacking attack
·
A trojan attack.
Explanation: This hypothetical situation illustrates a kind of
cyberattack that is variously referred to as "Session Hijacking" or
"Session Sidejacking." The user leaves their session active on the
laptop, which the attacker takes advantage of. The user's session may have a
session token saved in a browser cookie or another kind of authentication. If
the malicious user is able to get access to this token, they will have the
ability to impersonate the user and access the website or online service as if
they were the actual user.
It's important to remember to sign out of your account or
lock your computer whenever you move away from it, particularly when you're in
a public place.
9. Which one of these
shows why a DNS cache poisoning attack is dangerous?
Answers
·
It lets attackers access a site’s
database and cause damage by using database commands.
·
It allows an attacker to remotely
control your computer.
·
It’s not actually dangerous.
·
It allows an attacker to
redirect targets to malicious web servers.
Explanation: An
attacker will perform a DNS cache poisoning attack in which they will modify
the data stored in a DNS cache on a DNS resolver in order to provide inaccurate
information. If clients cache this inaccurate information and utilize it, it
might lead to users being sent to malicious websites, which may compromise the
users' security as well as their privacy. It is a cunning method of diverting
traffic and causing damage without the users being aware that they are being
tricked.
10. Which of the
following is true of a DDoS attack?
Answers
·
This type of attack is used to steal a
token and hijack a session.
·
The attack is used to redirect web
traffic to sites run by attackers.
·
The attack traffic comes
from lots of different hosts.
·
The attack comes from one source
sending a flood of SYN packets.
Explanation: An effort known as a Distributed Denial of Service (DDoS)
assault is designed to interfere with the typical operation of a computer
network, online service, or website by inundating it with an excessive volume
of traffic coming from a number of different sources. The targeted computer
system or network must be rendered inaccessible to the users for whom it was
designed. DDoS assaults may vary in scope and methodology, but they always
entail a concerted attempt to overwhelm the target with traffic in order to
make it unusable, unresponsive, or sluggish. This can make it impossible for
the target to function at all.
11. Which one of the
following results from a denial-of-service attack?
Answers
·
Service unreachable
·
Email address theft
·
Data destruction
·
Malware infection
Explanation: An attempt to deny a service, also known as a denial-of-service attack (DoS), is made with the intention of interfering with the typical operation of a computer system, network, or service. This may result in the temporary or permanent cessation of such services. The attack floods the target with traffic or exploits vulnerabilities, making it difficult or impossible for genuine users to use the services offered by the targeted system. The attack may either exploit vulnerabilities or flood the target with traffic.
12. Which of these
describes a rogue AP attack?
Answers
·
An attacker uses a form of malware to
perform admin level modification to a victim’s operating system.
·
A user tries to get to a service, but
the service can’t be reached because an attacker has overloaded it with packets
·
An employee at a company
plugs a router into the company network to make a simple wireless network. An
attacker standing outside the building takes advantage of this and goes onto
the wireless network.
·
Company employees think they are
connecting to the company network, but they are connecting to a fake, identical
network controlled by an attacker.
Explanation: An illegal construction of a wireless access point inside a
network is the basis of a kind of attack known as a rogue AP (Access Point).
This may put the security of the network at risk since it creates a point of
entry for malicious users to exploit in order to obtain unwanted access to the
network or to intercept and alter data. It is a stealthy method that attackers
may use to exploit vulnerabilities and perhaps conduct further assaults inside
a network that has already been hacked.
13. How can you protect
against client-side injection attacks? Check all that apply.
Answers
·
Use a SQL database
·
Use data sanitization
·
Utilize strong passwords
·
Use input validation.
14. An attacker uses
software that continuously tries different combinations of characters to gain
access to something password protected. What kind of attack is this?
Answers
·
A brute-force attack
·
A POD (Ping of Death) attack
·
A dictionary attack
·
A baiting attack
Explanation: An assault of this kind is referred to as a "Brute
Force Attack." When conducting a brute force attack, the attacker will
repeatedly and methodically try each and all conceivable character combinations
(such as passwords) until the proper one is discovered. The procedure is simple
yet time-consuming, and its efficacy is determined by aspects such as the
degree to which the password is complicated and how long it is. The use of
robust, convoluted passwords and the implementation of account lockout rules
may be effective means of defending against brute force assaults.
15. Which of these are
devices that let employees enter buildings and restricted areas and access
secured computer systems at any time, day or night?
Answers
·
Door locks
·
Equipment locks
·
Badge readers
·
Bollards
Explanation: It is common practice to refer to "Access Control
Systems" or simply "Access Cards/Keycards" when referring to the
devices that allow personnel unrestricted entry into buildings and other
restricted locations as well as anytime access to protected computer systems.
These systems may regulate and monitor access to a variety of physical and
digital places inside an organization by using physical cards, key fobs, or
even biometric data as a form of identification.
16. Two people arrive at
a building saying they are repair workers. An employee trusts them and lets
them in. As soon as they have access to the building, they hack into a computer
and steal confidential information. What kind of attack is this?
Answers
·
A tailgating attack
·
A spoofing attack
·
A zero day vulnerability attack
·
A phishing attack
Explanation: This hypothetical situation illustrates a social
engineering tactic known as a "Pretexting Attack." In the assault
technique known as pretexting, the adversary concocts a made-up situation or
pretext with the intention of misleading others into granting access to
sensitive information or systems. In one instance, the attackers claimed to be
maintenance personnel in order to obtain physical entry to the facility. Once
they were there, they used the access they had gained by hacking into a computer
in order to take private information. It is a misleading strategy that takes
advantage of people's confidence in one another and often entails coercing
individuals into engaging in behaviors that undermine security.
17. Which of these is an
XSS (Cross-site scripting) injection attack?
Answers
·
An attack where attackers fool an
employee into letting them into a restricted area or building
·
An attack that targets a whole website
and uses database commands to delete or steal data and run other malicious
commands
·
An attack that overloads a system with
ICMP echo requests to overwhelm it, and to prevent legitimate users from
accessing it.
·
An attack that inserts
malicious code into a website and targets the users of a service
Explanation: An XSS injection attack is one in which malicious scripts
are inserted into a website in an attempt to compromise its security. When
users visit a website that has been infiltrated, the browsers on those users'
computers run these malicious scripts without their knowledge. This gives the
attacker the ability to steal information, modify online content, or carry out
other harmful acts in the user's name. It is a typical example of a flaw in the
security of websites.
18. An IT professional makes a
backup of critical information from a company’s system so it can still be
accessed if the system is attacked. Which key principle for designing
information security policies does this represent?
Answers
·
The availability principle
·
The
intelligence principle
·
The
risk principle
·
The
integrity principle
19. Which of the following is true
of black hat and white hat hackers?
Answers
·
Black hats are malicious. White hats identify
weaknesses to help mitigate threats.
·
Black
hats try to find weaknesses, but white hats don’t.
·
Neither
black hats nor white hats can be trusted.
·
Black
hats work with owners to fix problems. White hats just try to get into a
system.
20. After a user downloads a free
software product, the computer’s browser automatically opens and jumps to
random product pages. What kind of malicious software is this?
Answers
·
Adware
·
A
worm
·
A
Keylogger
·
A
rootkit
21. An unhappy systems administrator
installed malware that attacked after a timed event, rather than when it was
installed. What type of malware does this describe?
Answers
·
Ransomware
·
A
logic bomb
·
A
rootkit
·
Spyware
22. A victim connects to a network
they think is legitimate, but the network is really an identical network
controlled by a hacker. What type of network attack are they a victim of?
Answers
·
A
Denial of Service (DoS)
·
A
logic bomb
·
An
evil twin
·
DNS
cache poisoning
23. Which type of network-based
attack prevents legitimate users from accessing a system by overwhelming the
network?
Answers
·
A
brute force password attack
·
An
injection attack
·
A
Denial of Service (DoS) attack
·
A
malware attack
24. An attacker sends a large number
of SYN packets, but does not send any ACK messages back. The connection stays
open and uses up the source’s resources. What is this attack called?
Answers
·
A
zero day exploit
·
A half-open attack
·
A
DNS cache poisoning attack
·
A
ping flood
25. Which of the following measures
can prevent injection attacks? Select all that apply.
Answers
·
Data sanitization
·
Log
analysis systems
·
Input validation
·
Flood
guards
Answers
·
An
Injection attack
·
A
phishing attack
·
A
dictionary attack
·
A brute force attack
27. An email message tells a user
there is a problem with the user’s bank account. The email directs the user to
a login page that steals the user’s information. What is this called?
Answers
·
Phishing
·
Tailgating
·
Injection
·
Denial
of Service
Shuffle Q/A
1
28. Which of the following is an
example of the CIA triad’s confidentiality principle in action?
Answers
·
Preventing
an unwanted download
·
Making
sure data hasn’t been tampered with
·
Protecting online accounts with a password
·
Preventing
data loss
29. Which of the following is an
example of a zero-day vulnerability?
Answers
·
A
user accidentally loads malware onto a computer that logs the user’s keypresses
and uses them to get confidential information.
·
After
a user downloads and starts a piece of software, it starts showing ads and
collecting data.
·
A group of hackers finds a flaw in a new
software product and takes advantage of it before the vendor or developer finds
it.
·
A
user voluntarily downloads a piece of software hoping it will be useful, but
instead it lets hackers access the user’s computer.
30. What kind of malware can block
access to data and decrease the availability of security by holding the system
hostage?
Answers
·
Spyware
·
A
logic bomb
·
Ransomware
·
Adware
31. What is it called when a hacker
gets into a system through a secret entryway to gain remote access to the
computer?
Answers
·
Ransomware
·
A backdoor
·
Adware
·
A
Trojan
32. Which of the following best
helps you strengthen your password?
Answers
·
Use passwords from a precompiled list
·
Incorporate symbols, numbers, and capital
letters
·
Choose
the name of a favorite movie as a password
·
Use
the name of a beloved pet as a password
33. An attacker leaves a flash drive
loaded with malware on a table. Someone plugs the drive into their computer to
see what’s on it and accidentally installs malware. What kind of attack is
this?
Answers
·
Baiting
·
DDoS
·
Phishing
·
Tailgating
It is a
method of social engineering that takes use of human inquisitiveness and relies
on people's innate propensity to examine newly found things and engage with
them. The assault takes advantage of the widespread confidence that people have
in media that may be removed, which makes it a possible security issue.
Answers
·
Worms
replicate through files, but viruses live on their own.
·
Viruses
do not replicate, but worms do.
·
Worms
replicate, but viruses do not.
·
Viruses replicate through files, but worms live on their own.
A computer
virus might be thought of as a digital hitchhiker. It then waits for a user to
access or execute the genuine application or file that it has attached itself
to, after which it deletes itself. After it has been triggered, the virus will
begin to multiply and will move to other files and applications, where it will
attempt to corrupt or damage them.
On the
other hand, a worm is more self-sufficient and takes the initiative more often.
It is not necessary for there to be a host software for it to attach onto.
Instead, it replicates and spreads itself by taking advantage of flaws in the
operating system of a computer or the network that it is connected to. Worms
are capable of moving via several networks and systems, which may result in
broad infections.
Answers
·
SYN
flood attack
·
A rogue AP (Access Point) attack
·
A
Denial-of-Service (DoS) attack
·
A
DNS cache poisoning attack
36. Which of the following can occur
during a ping of death (POD) attack? Select all that apply.
Answers
·
Phishing
·
Baiting
·
A buffer overflow
·
Execution of malicious code
Answers
·
Distributed
denial-of-service (DDoS)
·
Cross-site
Scripting (XSS)
·
A
SQL injection
·
A
password attack
Because of
the spread nature of the assault, which involves several devices that have been
infiltrated, it is more difficult to find a single source and find a solution
to the problem. The purpose of a distributed denial of service assault (DDoS)
is often to cause disruption to services, financial losses, or to make a
statement.
Answers
·
Cross-site Scripting (XSS)
·
SQL injection
·
A
dictionary attack
·
A
Denial-of-Service (DoS) attack
An
attacker may get access to the website's database by altering the input in such
a manner that it results in the execution of undesired SQL instructions. In the
scenario that you described, the attacker is executing instructions that remove
data from the database, which might result in the loss of data as well as an
interruption to the functioning of the website. In order to avoid SQL Injection
vulnerabilities, web developers need to incorporate effective input validation
and parameterized queries. SQL Injection vulnerabilities are a major threat to
website security.
Answers
·
Network
·
Social engineering
·
Malware
·
Injection
Shuffle Q/A 2
40. In the terminology of
information security, what is a vulnerability?
Answers
·
The
possibility of suffering a loss in the event of an attack
·
A
program that entices users to download it, then installs malware on their
systems
·
A
piece of malware that records each keypress by the user and gathers
confidential information
·
A flaw in the code of an application that can be exploited
Information
security experts actively seek to find, analyze, and mitigate vulnerabilities
inside a system or organization in order to lower the risk of such
vulnerabilities being exploited and improve the overall security posture of the
system or organization. This procedure often include doing routine security
audits, patching and upgrading software, and putting in place best practices in
order to address any possible vulnerabilities.
41. What is a tool that protects
passwords by checking whether the input is coming from a machine or a human?
Answers
·
A
firewall
·
A
CAPTCHA
·
A
key logger
·
Antimalware
software
CAPTCHAs
are designed to prevent automated scripts or bots from exploiting online
services, notably in situations such as account registration, attempted logins,
or the submission of forms. Websites may add an extra degree of security by
asking users to complete a CAPTCHA in order to verify that the interaction was
not started by an automated program but rather by a real person. This helps to
prevent malicious bots from taking over websites.
42. Which one of the following is a type of DoS attack?
Answers
·
A brute force attack
·
A rogue AP attack
·
A SYN flood attack
·
A DNS cache poisoning
attack
Explanation: The "Ping Flood" option
that you supplied is an example of a Denial of Service (DoS) attack. An
attacker may launch a Ping Flood attack on a target system by sending it an
overwhelming amount of ping requests. This causes the target system's network
resources to be depleted and results in a denial of service for legitimate
users. The objective is to overwhelm the target with so much traffic that it
either stops responding to genuine requests or takes an excessively long time
to do so.