1. In the CIA Triad, "Confidentiality" means ensuring that data is:
Answers
· accurate and was not tampered with.
· available and that people can access it.
· not accessible by unwanted parties.
· accessible anonymously.
Explanation: When discussing the CIA Triad, "Confidentiality" refers to the process of ensuring that material is kept secret and that only authorized persons are able to access it. Protecting sensitive information from being accessed or disclosed in an unauthorized manner is a part of it. To protect the privacy of sensitive information, it is common practice to use precautions such as encoding, access limits, and encrypted communication methods.
2. In the CIA Triad, "Integrity" means ensuring that data is:
Answers
· available and that people can access it.
· truthful and honest.
· accurate and was not tampered with.
· not accessible by unwanted parties.
Explanation: In the context of the CIA Triad, "integrity" refers to the process of ensuring that data does not lose its accuracy, consistency, or integrity while being stored, transmitted, or processed. It entails safeguarding data from illegal alterations or tampering, as well as ensuring that information continues to be reliable and trustworthy. Data checksums, hashing, and access control are some of the most frequent methods that are used while attempting to maintain the data's integrity.
3. In the CIA Triad, "Availability" means ensuring that data is:
Answers
· available to anyone from anywhere.
· available and people can access it.
· not accessible by unwanted parties.
· accurate and was not tampered with.
Explanation: In the context of the CIA Triad, "integrity" refers to the process of ensuring that data does not lose its accuracy, consistency, or integrity while being stored, transmitted, or processed. It entails safeguarding data from illegal alterations or tampering, as well as ensuring that information continues to be reliable and trustworthy. Data checksums, hashing, and access control are some of the most frequent methods that are used while attempting to maintain the data's integrity.
4. What's the relationship between a vulnerability and an exploit?
Answers
· An exploit creates a vulnerability in a system.
· An exploit takes advantage of a vulnerability to run arbitrary code or gain access.
· They’re unrelated.
· A vulnerability takes advantage of an exploit to run arbitrary code or gain access.
Explanation: Consider a vulnerability to be a weakness or fault in the design, implementation, or configuration of a system that has the potential to be exploited by an attacker. Now, an exploit is the specific instrument, strategy, or procedure that is used in order to take advantage of a vulnerability.
It's the same as having a gaping hole in the side of the building (a vulnerability), and an exploit is the method by which someone specifically breaches that gap. Therefore, flaws are referred to as vulnerabilities, and exploits are the elements that turn vulnerabilities into a problem.
5. Which statement is true for both a worm and a virus?
Answers
· They infect other files with malicious code.
· They’re self-replicating and self-propagating.
· They don’t cause any harm to the target system.
· They’re undetectable by antimalware software.
Explanation: Both worms and viruses are intended to multiply and propagate, and they may be harmful to a system in a variety of ways, including infecting files, taking advantage of weaknesses, or interfering with the way the system normally functions.
6. Check all examples of types of malware:
Answers
· Adware
· Viruses
· Worms
· Key Generators
7. What are the characteristics of a rootkit? Check all that apply.
Answers
· Is harmless
· Is difficult to detect
· Is destructive
· Provides elevated credentials
8. A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop’s user on the website the user is logged into. What kind of attack is this?
Answers
· A ransomware attack.
· A rogue AP attack
· A session hijacking attack
· A trojan attack.
Explanation: This hypothetical situation illustrates a kind of cyberattack that is variously referred to as "Session Hijacking" or "Session Sidejacking." The user leaves their session active on the laptop, which the attacker takes advantage of. The user's session may have a session token saved in a browser cookie or another kind of authentication. If the malicious user is able to get access to this token, they will have the ability to impersonate the user and access the website or online service as if they were the actual user.
It's important to remember to sign out of your account or lock your computer whenever you move away from it, particularly when you're in a public place.
9. Which one of these shows why a DNS cache poisoning attack is dangerous?
Answers
· It lets attackers access a site’s database and cause damage by using database commands.
· It allows an attacker to remotely control your computer.
· It’s not actually dangerous.
· It allows an attacker to redirect targets to malicious web servers.
Explanation: An attacker will perform a DNS cache poisoning attack in which they will modify the data stored in a DNS cache on a DNS resolver in order to provide inaccurate information. If clients cache this inaccurate information and utilize it, it might lead to users being sent to malicious websites, which may compromise the users' security as well as their privacy. It is a cunning method of diverting traffic and causing damage without the users being aware that they are being tricked.
10. Which of the following is true of a DDoS attack?
Answers
· This type of attack is used to steal a token and hijack a session.
· The attack is used to redirect web traffic to sites run by attackers.
· The attack traffic comes from lots of different hosts.
· The attack comes from one source sending a flood of SYN packets.
Explanation: An effort known as a Distributed Denial of Service (DDoS) assault is designed to interfere with the typical operation of a computer network, online service, or website by inundating it with an excessive volume of traffic coming from a number of different sources. The targeted computer system or network must be rendered inaccessible to the users for whom it was designed. DDoS assaults may vary in scope and methodology, but they always entail a concerted attempt to overwhelm the target with traffic in order to make it unusable, unresponsive, or sluggish. This can make it impossible for the target to function at all.
11. Which one of the following results from a denial-of-service attack?
Answers
· Service unreachable
· Email address theft
· Data destruction
· Malware infection
Explanation: An attempt to deny a service, also known as a denial-of-service attack (DoS), is made with the intention of interfering with the typical operation of a computer system, network, or service. This may result in the temporary or permanent cessation of such services. The attack floods the target with traffic or exploits vulnerabilities, making it difficult or impossible for genuine users to use the services offered by the targeted system. The attack may either exploit vulnerabilities or flood the target with traffic.
12. Which of these describes a rogue AP attack?
Answers
· An attacker uses a form of malware to perform admin level modification to a victim’s operating system.
· A user tries to get to a service, but the service can’t be reached because an attacker has overloaded it with packets
· An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network.
· Company employees think they are connecting to the company network, but they are connecting to a fake, identical network controlled by an attacker.
Explanation: An illegal construction of a wireless access point inside a network is the basis of a kind of attack known as a rogue AP (Access Point). This may put the security of the network at risk since it creates a point of entry for malicious users to exploit in order to obtain unwanted access to the network or to intercept and alter data. It is a stealthy method that attackers may use to exploit vulnerabilities and perhaps conduct further assaults inside a network that has already been hacked.
13. How can you protect against client-side injection attacks? Check all that apply.
Answers
· Use a SQL database
· Use data sanitization
· Utilize strong passwords
· Use input validation.
14. An attacker uses software that continuously tries different combinations of characters to gain access to something password protected. What kind of attack is this?
Answers
· A brute-force attack
· A POD (Ping of Death) attack
· A dictionary attack
· A baiting attack
Explanation: An assault of this kind is referred to as a "Brute Force Attack." When conducting a brute force attack, the attacker will repeatedly and methodically try each and all conceivable character combinations (such as passwords) until the proper one is discovered. The procedure is simple yet time-consuming, and its efficacy is determined by aspects such as the degree to which the password is complicated and how long it is. The use of robust, convoluted passwords and the implementation of account lockout rules may be effective means of defending against brute force assaults.
15. Which of these are devices that let employees enter buildings and restricted areas and access secured computer systems at any time, day or night?
Answers
· Door locks
· Equipment locks
· Badge readers
· Bollards
Explanation: It is common practice to refer to "Access Control Systems" or simply "Access Cards/Keycards" when referring to the devices that allow personnel unrestricted entry into buildings and other restricted locations as well as anytime access to protected computer systems. These systems may regulate and monitor access to a variety of physical and digital places inside an organization by using physical cards, key fobs, or even biometric data as a form of identification.
16. Two people arrive at a building saying they are repair workers. An employee trusts them and lets them in. As soon as they have access to the building, they hack into a computer and steal confidential information. What kind of attack is this?
Answers
· A tailgating attack
· A spoofing attack
· A zero day vulnerability attack
· A phishing attack
Explanation: This hypothetical situation illustrates a social engineering tactic known as a "Pretexting Attack." In the assault technique known as pretexting, the adversary concocts a made-up situation or pretext with the intention of misleading others into granting access to sensitive information or systems. In one instance, the attackers claimed to be maintenance personnel in order to obtain physical entry to the facility. Once they were there, they used the access they had gained by hacking into a computer in order to take private information. It is a misleading strategy that takes advantage of people's confidence in one another and often entails coercing individuals into engaging in behaviors that undermine security.
17. Which of these is an XSS (Cross-site scripting) injection attack?
Answers
· An attack where attackers fool an employee into letting them into a restricted area or building
· An attack that targets a whole website and uses database commands to delete or steal data and run other malicious commands
· An attack that overloads a system with ICMP echo requests to overwhelm it, and to prevent legitimate users from accessing it.
· An attack that inserts malicious code into a website and targets the users of a service
Explanation: An XSS injection attack is one in which malicious scripts are inserted into a website in an attempt to compromise its security. When users visit a website that has been infiltrated, the browsers on those users' computers run these malicious scripts without their knowledge. This gives the attacker the ability to steal information, modify online content, or carry out other harmful acts in the user's name. It is a typical example of a flaw in the security of websites.
18. An IT professional makes a backup of critical information from a company’s system so it can still be accessed if the system is attacked. Which key principle for designing information security policies does this represent?
Answers
· The availability principle
· The intelligence principle
· The risk principle
· The integrity principle
19. Which of the following is true of black hat and white hat hackers?
Answers
· Black hats are malicious. White hats identify weaknesses to help mitigate threats.
· Black hats try to find weaknesses, but white hats don’t.
· Neither black hats nor white hats can be trusted.
· Black hats work with owners to fix problems. White hats just try to get into a system.
20. After a user downloads a free software product, the computer’s browser automatically opens and jumps to random product pages. What kind of malicious software is this?
Answers
· Adware
· A worm
· A Keylogger
· A rootkit
21. An unhappy systems administrator installed malware that attacked after a timed event, rather than when it was installed. What type of malware does this describe?
Answers
· Ransomware
· A logic bomb
· A rootkit
· Spyware
22. A victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. What type of network attack are they a victim of?
Answers
· A Denial of Service (DoS)
· A logic bomb
· An evil twin
· DNS cache poisoning
23. Which type of network-based attack prevents legitimate users from accessing a system by overwhelming the network?
Answers
· A brute force password attack
· An injection attack
· A Denial of Service (DoS) attack
· A malware attack
24. An attacker sends a large number of SYN packets, but does not send any ACK messages back. The connection stays open and uses up the source’s resources. What is this attack called?
Answers
· A zero day exploit
· A half-open attack
· A DNS cache poisoning attack
· A ping flood
25. Which of the following measures can prevent injection attacks? Select all that apply.
Answers
· Data sanitization
· Log analysis systems
· Input validation
· Flood guards
Answers
· An Injection attack
· A phishing attack
· A dictionary attack
· A brute force attack
27. An email message tells a user there is a problem with the user’s bank account. The email directs the user to a login page that steals the user’s information. What is this called?
Answers
· Phishing
· Tailgating
· Injection
· Denial of Service
Shuffle Q/A 1
28. Which of the following is an example of the CIA triad’s confidentiality principle in action?
Answers
· Preventing an unwanted download
· Making sure data hasn’t been tampered with
· Protecting online accounts with a password
· Preventing data loss
29. Which of the following is an example of a zero-day vulnerability?
Answers
· A user accidentally loads malware onto a computer that logs the user’s keypresses and uses them to get confidential information.
· After a user downloads and starts a piece of software, it starts showing ads and collecting data.
· A group of hackers finds a flaw in a new software product and takes advantage of it before the vendor or developer finds it.
· A user voluntarily downloads a piece of software hoping it will be useful, but instead it lets hackers access the user’s computer.
30. What kind of malware can block access to data and decrease the availability of security by holding the system hostage?
Answers
· Spyware
· A logic bomb
· Ransomware
· Adware
31. What is it called when a hacker gets into a system through a secret entryway to gain remote access to the computer?
Answers
· Ransomware
· A backdoor
· Adware
· A Trojan
32. Which of the following best helps you strengthen your password?
Answers
· Use passwords from a precompiled list
· Incorporate symbols, numbers, and capital letters
· Choose the name of a favorite movie as a password
· Use the name of a beloved pet as a password
33. An attacker leaves a flash drive loaded with malware on a table. Someone plugs the drive into their computer to see what’s on it and accidentally installs malware. What kind of attack is this?
Answers
· Baiting
· DDoS
· Phishing
· Tailgating
It is a method of social engineering that takes use of human inquisitiveness and relies on people's innate propensity to examine newly found things and engage with them. The assault takes advantage of the widespread confidence that people have in media that may be removed, which makes it a possible security issue.
Answers
· Worms replicate through files, but viruses live on their own.
· Viruses do not replicate, but worms do.
· Worms replicate, but viruses do not.
· Viruses replicate through files, but worms live on their own.
A computer virus might be thought of as a digital hitchhiker. It then waits for a user to access or execute the genuine application or file that it has attached itself to, after which it deletes itself. After it has been triggered, the virus will begin to multiply and will move to other files and applications, where it will attempt to corrupt or damage them.
On the other hand, a worm is more self-sufficient and takes the initiative more often. It is not necessary for there to be a host software for it to attach onto. Instead, it replicates and spreads itself by taking advantage of flaws in the operating system of a computer or the network that it is connected to. Worms are capable of moving via several networks and systems, which may result in broad infections.
Answers
· SYN flood attack
· A rogue AP (Access Point) attack
· A Denial-of-Service (DoS) attack
· A DNS cache poisoning attack
36. Which of the following can occur during a ping of death (POD) attack? Select all that apply.
Answers
· Phishing
· Baiting
· A buffer overflow
· Execution of malicious code
Answers
· Distributed denial-of-service (DDoS)
· Cross-site Scripting (XSS)
· A SQL injection
· A password attack
Because of the spread nature of the assault, which involves several devices that have been infiltrated, it is more difficult to find a single source and find a solution to the problem. The purpose of a distributed denial of service assault (DDoS) is often to cause disruption to services, financial losses, or to make a statement.
Answers
· Cross-site Scripting (XSS)
· SQL injection
· A dictionary attack
· A Denial-of-Service (DoS) attack
An attacker may get access to the website's database by altering the input in such a manner that it results in the execution of undesired SQL instructions. In the scenario that you described, the attacker is executing instructions that remove data from the database, which might result in the loss of data as well as an interruption to the functioning of the website. In order to avoid SQL Injection vulnerabilities, web developers need to incorporate effective input validation and parameterized queries. SQL Injection vulnerabilities are a major threat to website security.
Answers
· Network
· Social engineering
· Malware
· Injection
Shuffle Q/A 2
40. In the terminology of information security, what is a vulnerability?
Answers
· The possibility of suffering a loss in the event of an attack
· A program that entices users to download it, then installs malware on their systems
· A piece of malware that records each keypress by the user and gathers confidential information
· A flaw in the code of an application that can be exploited
Information security experts actively seek to find, analyze, and mitigate vulnerabilities inside a system or organization in order to lower the risk of such vulnerabilities being exploited and improve the overall security posture of the system or organization. This procedure often include doing routine security audits, patching and upgrading software, and putting in place best practices in order to address any possible vulnerabilities.
41. What is a tool that protects passwords by checking whether the input is coming from a machine or a human?
Answers
· A firewall
· A CAPTCHA
· A key logger
· Antimalware software
CAPTCHAs are designed to prevent automated scripts or bots from exploiting online services, notably in situations such as account registration, attempted logins, or the submission of forms. Websites may add an extra degree of security by asking users to complete a CAPTCHA in order to verify that the interaction was not started by an automated program but rather by a real person. This helps to prevent malicious bots from taking over websites.
42. Which one of the following is a type of DoS attack?
Answers
· A brute force attack
· A rogue AP attack
· A SYN flood attack
· A DNS cache poisoning attack
Explanation: The "Ping Flood" option that you supplied is an example of a Denial of Service (DoS) attack. An attacker may launch a Ping Flood attack on a target system by sending it an overwhelming amount of ping requests. This causes the target system's network resources to be depleted and results in a denial of service for legitimate users. The objective is to overwhelm the target with so much traffic that it either stops responding to genuine requests or takes an excessively long time to do so.