- establish trust
- distribute malicious email
- perform open-box testing
- obtain access credentials
Q: What is the main difference between a vishing attack and a smishing
attack?
- Vishing is used to target executives at an organization.
- Vishing involves a widespread email campaign to steal information.
- Vishing makes use of voice calls to trick targets.
- Vishing exploits social media posts to identify targets.
Q: Fill in the blank: The main difference between a worm and a virus is
that a worm can _____.
- operate without the target’s knowledge
- take control of an infected system by encrypting its data
- be delivered inside of a legitimate-looking application
- replicate itself across devices without requiring users to perform an action
Explanation: The primary distinction between a virus and a worm is that a worm is capable of replicating itself across several machines without the need for users to take any action.
Q: Which type of malware requires the user to make a payment to the
attacker to regain access to their device?
- Brute force attacks
- Cryptojacking
- Botnets
- Ransomware
Q: Fill in the blank: Cryptojacking is a type of malware that uses
someone’s device to _____ cryptocurrencies.
- collect
- mine
- earn
- invest
Q: What is malicious code that is inserted into a vulnerable application
called?
- Social engineering
- Input validation
- Injection attack
- Cryptojacking
Q: An attacker sends a malicious link to subscribers of a sports news
site. If someone clicks the link, a malicious script is sent to the site’s
server and activated during the server’s response.
- This is an example of what type of injection attack?
- Stored
- DOM-based
- SQL injection
- Reflected
Q: What are the reasons that an attacker would perform a SQL injection
attack? Select three answers.
- To send phishing messages to users in a database
- To delete entire tables in a database
- To steal the access credentials of users in a database
- To gain administrative rights to a database
Q: What are some key benefits of the threat modeling process? Select all
that apply.
- Identify points of failure
- Help prioritize threats
- Reduce an attack surface
- Remediate all vulnerabilities
Q: A security team is decomposing an application during a PASTA threat
model. What information will they discover during this step of the process?
- The types of threats that can be used to compromise data
- Which data owners are compromising the organization
- The vulnerabilities that have been reported to the CVE® list
- How the application handles data and which controls are in place
Q: Which of the following could be examples of social engineering
attacks? Select three answers.
- An email urgently asking you to send money to help a friend who is stuck in a foreign country
- A pop-up advertisement promising a large cash reward in return for sensitive information
- An unfamiliar employee asking you to hold the door open to a restricted area
- A lost record of important customer information
Q: Fill in the blank: _____ uses text messages to manipulate targets
into sharing sensitive information.
- Pretexting
- Smishing
- Vishing
- Whaling
Q: A digital artist receives a free version of professional editing
software online that has been infected with malware. After installing the
program, their computer begins to freeze and crash repeatedly.
The malware hidden in this editing software is an example of which type
of malware?
- Spyware
- Adware
- Scareware
- Trojan
Q: Fill in the blank: A(n) _____ tool can be used by security
professionals to catch abnormal activity, like malware mining for
cryptocurrency.
- Intrusion detection system (IDS)
- Fileless malware
- Spyware
- Attack tree
Q: A hacktivist group gained access to the website of a utility
company. The group bypassed the site’s login page by inserting malicious code
that granted them access to customer accounts to clear their debts.
What type of attack did the hacktivist group perform?
- Quid pro quo
- Watering hole
- Injection
- Rainbow table
Q: Fill in the blank: A _____ cross-site scripting (XSS) attack is an
instance when malicious script exists in the webpage a browser loads.
- Brute force
- Stored
- DOM-based
- Reflected
Q: During which stage of the PASTA framework is an attack tree created?
- Vulnerability analysis
- Threat analysis
- Decomposing an application
- Attack modeling
Q: Which of the following are not types of malware? Select two answers.
- Cross-site scripting
- Worm
- Virus
- SQL injection
Q: Which of the following are common signs that a computer is infected
with cryptojacking software? Select three answers.
- Unusually high electricity costs
- Sudden system crashes
- Modified or deleted files
- Increased CPU usage
Q: Which of the following are areas of a website that are vulnerable to
SQL injection? Select two answers.
- Pop-up advertisements
- Credit card payment forms
- Social media feeds
- User login pages
Q: Which stage of the PASTA framework is related to identifying the
application components that must be evaluated?
- Implement prepared statements
- Perform a vulnerability analysis
- Define the technical scope
- Characterize the environment
Q: A threat actor tricked a new employee into sharing information about
a senior executive over the phone.
- This is an example of what kind of attack?
- SQL injection
- Malware
- Credential stuffing Social engineering
Q: What is the most common form of social engineering used by
attackers?
- Ransomware
- Adware
- Malware
- Phishing
Q: A government contractor is tricked into installing a virus on their
workstation that encrypts all their files. The virus displays a message on the
workstation telling the contractor that they can have the files decrypted if
they make a payment of $31,337 to an email address.
What type of attack is this an example of?
- Cross-site scripting
- Ransomware
- Brute force attack
- Scareware