Review Questions Final
Review Questions Final
Review Questions Final
A. Operational
B. Technical
C. Corrective
D. Managerial
credit card data. Jade's primary concern is the fact that the organization is
subject to sanctions for violating the provisions of the Payment Card Industry
A. Strategic
B. Compliance
C. Operational
D. Financial
3. Chris is responding to a security incident that compromised one of his
organization's web servers. He believes that the attackers defaced one or more
pages on the website. What cybersecurity objective did this attack violate?
A. Confidentiality
B. Nonrepudiation
C. Integrity
D. Availability
the table shown here. What type of data minimization has most likely been
Technet24
A. Destruction
B. Masking
C. Tokenization
D. Hashing
5. Tonya is concerned about the risk that an attacker will attempt to gain access
to her organization's database server. She is searching for a control that would
discourage the attacker from attempting to gain access. What type of security
A. Preventive
B. Detective
C. Corrective
D. Deterrent
wireless network. What DLP technology would best meet this goal?
A. Watermarking
B. Pattern recognition
C. Host-based
D. Network-based
7. What term best describes data that is being sent between two systems over
a network connection?
A. Data at rest
B. Data in transit
C. Data in processing
D. Data in use
A. Technical control
B. Physical control
C. Managerial control
D. Operational control
Technet24
9. Which one of the following is not a common goal of a cybersecurity
attacker?
A. Disclosure
B. Denial
C. Alteration
D. Allocation
10. Tony is reviewing the status of his organization's defenses against a breach of
their file server. He believes that a compromise of the file server could reveal
A. Strategic
B. Reputational
C. Financial
D. Operational
11. Which one of the following data elements is not commonly associated with
D. Passport number
12. What term best describes an organization's desired security state?
A. Control objectives
B. Security priorities
C. Strategic goals
D. Best practices
13. Lou mounted the sign below on the fence surrounding his organization's
A. Compensating
B. Detective
C. Physical
D. Deterrent
B. Data obfuscation
C. Data minimization
D. Data encryption
controls and discovered a potential gap: the organization Technet24 does not
use full-disk encryption on laptops. What type of control gap exists in this
case?
A. Detective
B. Corrective
C. Deterrent
D. Preventive
16. What compliance regulation most directly a ects the operations of a health-
care provider?
A. HIPAA
B. PCI DSS
C. GLBA
D. SOX
17. Nolan is writing an after action report on a security breach that took place
in this breach?
A. Availability
B. Nonrepudiation
C. Confidentiality
D. Integrity
18. Which one of the following objectives is not one of the three main objectives
A. Integrity
B. Nonrepudiation
C. Availability
D. Confidentiality
19. Which one of the following data protection techniques is reversible when
conducted properly?
A. Tokenization
B. Masking
C. Hashing
D. Shredding
20. Which one of the following statements is not true about compensating
requirement.
requirement..
CH2
intelligence?
A. Timeliness
B. Detail
C. Accuracy
D. Relevance
A. War
B. Financial gain
C. Political/philosophical beliefs
D. Ethical
that system. What term best describes Kolin's work? A. Authorized attacker
B. Unauthorized attacker
C. Unknown attacker
D. Semi-authorized attacker
B. Hacktivist
C. Unskilled
D. Insider
5. Which organization did the U.S. government help create to share knowledge
A. DHS
B. SANS
C. CERTS
D. ISACs
6. Which of the following threat actors typically has the greatest access to
resources?
A. Nation-state actors
B. Organized crime
C. Hacktivists
D. Insider threats
7. Of the threat vectors shown here, which one is most commonly exploited by
A. Email
B. Direct access
C. Wireless
D. Removable media
A. Chinese military
B. U.S. government
C. Russian mafia
D. Anonymous
threats? A. Behavioral
B. Instinctual
C. Habitual
D. IoCs
10. Cindy is concerned that her organization may be targeted by a supply chain
attack and is conducting a review of all of her vendor and supplier partners.
Which one of the following organizations is least likely to be the conduit for a
A. Hardware provider
B. Software provider
D. Talent provider
11. Greg believes that an attacker may have installed malicious firmware
supplier. What type of threat vector best describes this attack? A. Supply
chain
B. Removable media
C. Cloud
D. Direct access
12. Ken is conducting threat research on Transport Layer Security (TLS) and
would like to consult the authoritative reference for the protocol's technical
A. Academic journal
B. Internet RFCs
Technet24
C. Subject matter experts
D. Textbooks
Which one of the following should concern her most, if discovered in a public
repository?
A. Product manuals
B. Source code
C. API keys
14. Which one of the following threat research tools is used to visually display
A. Threat map
B. Predictive analysis
C. Vulnerability feed
D. STIX
15. Vince recently received the hash values of malicious software that several
other firms in his industry found installed on their systems after a compromise.
A. Vulnerability feed
B. IoC
C. TTP
D. RFC
16. Ursula recently discovered that a group of developers are sharing information
over a messaging tool provided by a cloud vendor but not sanctioned by her
B. System integration
C. Vendor management
D. Data exfiltration
D. Increased costs
D. WHOIS queries
A. Insider
B. State actor
C. Hacktivist
D. APT
E. Organized crime
20. Renee is a cybersecurity hobbyist. She receives an email about a new web-
based grading system being used by her son's school and she visits the site. She
notices that the URL for the site looks like this:
Technet24 www.myschool.edu/grades.php&studentID=1023425
She realizes that 1023425 is her son's student ID number and she then
www.myschool.edu/grades.php&studentID=1023424
www.myschool.edu/grades.php&studentID=1023426
www.myschool.edu/grades.php&studentID=1023427
When she does so, she accesses the records of other students. She closes the
A. Authorized hacking
B. Unknown hacking
C. Semi-authorized hacking
D. Unauthorized hacking
Ch3
impacting his organization. What technique will most e ectively limit the
rootkit and wants to write IoC definitions for it. Which of the following is not
A. File hashes
D. Behavior-based identifiers
3. Nathan works at a school and notices that one of his sta appears to have
logged in and changed grades for a single student to higher grades, even in
classes that sta member is not responsible for. When asked, the sta member
says that they did not perform the action. Which of the following is the most
likely way that a student could have gotten access to the sta member's
password?
A. A keylogger
B. A rootkit
C. Spyware
D. A logic bomb
4. Amanda notices tra c between her systems and a known malicious host on
TCP port 6667. What type of tra c is she most likely detecting?
B. Spyware
C. A worm
5. Mike discovers that attackers have left software that allows them to have
A. A worm
B. Crypto malware
C. A trojan
D. A backdoor
6. What is the primary impact of bloatware?
A. Consuming resources
B. Logging keystrokes
parties
A. A Trojan
B. Bloatware
C. Spyware
D. A rootkit
that uses multiple antimalware and antivirus engines to scan the sample.
He receives multiple di erent answers for what the malware package is.
What has occurred? A. The package contains more than one piece of
malware.
investigating. What best describes data that may have been stolen?
C. All files the user accessed while the keylogger was active
payment in Bitcoin and claiming that the data from the system has been
A. Worms
B. A virus
C. Ransomware
D. Rootkit
11. Rick believes that a system he is responsible for has been compromised
with malware that uses a rootkit to obtain and retain access to the system.
When he runs an antimalware tool's scanner, the system doesn't show any
malware. If he has other data that indicates the system is infected, what
should his next step be if he wants to determine what malware may be on the
system?
the organization claiming that they left code in an application that they wrote
that will delete files and bring the application down if they are not employed
A. Ransomware
Technet24
B. Extortionware
C. A logic bomb
D. A Trojan
13. Selah wants to ensure that malware is completely removed from a system.
quarantine setting.
15. Ben wants to analyze Python code that he believes may be malicious code
installation?
WordPress service cluster has been infected. What type of malware is most
network?
A. A logic bomb
B. A Trojan
C. A worm
D. A rootkit
that load at startup that were installed by the manufacturer. What type of
software is this?
A. Viruses
B. Trojans
C. Spyware
D. Bloatware
B. A drone
C. A vampire
D. A worm
20. Randy believes that a system that he is responsible for was infected after a
user picked up a USB drive and plugged it in. The user claims that they only
opened one file on the drive to see who might own it. What type of malware is
Technet24
A. A virus
B. A worm
C. A trojan
D. A spyware tool
Ch4
password due to a recent account issue. He notices that the email links him to
A. Typosquatting
B. Phishing
C. Smishing
A. Whaling
B. Spoofing
C. Spooning
D. Vishing
3. While reviewing her logs, Michele notices that a remote system has
attempted to log into her server via SSH using the username admin and a
A. A brute-force attack
B. Shoulder surfing
C. An on-path attack
D. Pretexting
4. Joanna wants to detect password spraying attacks. What type of rule should
A. Match attempts to log into many systems with the sameusername and
password.
erent passwords.
5. One of the sta at Susan's organization has reported that a critical vendor has
contacted them about an unpaid invoice. After Susan investigates, she discovers
that the invoice was sent from an email account that was not typically a contact
and that the invoice requested payment to a PayPal account. What type of social
A. Smishing
C. Disinformation
D. Typosquatting
6. Selah infects the ads on a website that users from her target company
frequently visit with malware as part of her penetration test. What technique
B. Vishing
C. Whaling
D. Typosquatting
against his company. What log information is least likely to be useful when
8. Melissa receives a call and the caller informs her a senior manager in her
organization needs her to buy gift cards for an event that starts in an hour. The
caller says that the senior leader forgot to get the cards, and that the event is
critical to her organization. Melissa buys the cards and sends them to the Gmail
address the caller says that the senior leader needs them sent to. What type of
A. Phishing
B. Pretexting
C. Business email compromise
D. Carding
9. Alaina wants to determine if a password spraying attack was used against her
10. Which of the following human vectors is primarily associated with nation-state
actors?
A. Misinformation campaigns
D. Password spraying
11. Nicole accidentally types www.smazon.com into her browser and discovers
that she is directed to a di erent site loaded with ads and pop-ups. Which of the
following is the most accurate description of the attack she has experienced?
A. DNS hijacking
B. Pharming
C. Typosquatting
12. Devon is a penetration tester and sets up malicious tools on his Technet24
conducting?
A. A misinformation campaign
C. A typosquatting attack
D. A disinformation campaign
13. Phishing emails sent pretending to be from a company that recipients are
A. Phishing
B. Pharming
C. Brand impersonation
D. Pretexting
14. When a caller was recently directed to Amanda, who is a junior IT employee
at her company, the caller informed her that they were the head of IT for her
firewall. After Amanda made the change, she discovered that the caller was not
the head of IT, and that they were actually a penetration tester hired by her
A. Smishing
B. Pretexting
C. Impersonation
D. Vishing
15. Fred is concerned about text message–based attacks. Which of the following
A. Impersonation
C. Smishing
16. Sharif notices that his authentication logs have many di erent usernames
showing failed logins with the same password. What type of attack has he
discovered?
A. Credential harvesting
B. Impersonation
C. BEC
D. Spraying
17. Naomi receives a report of smishing. What type of attack should she be
looking for?
C. Voicemail-based phishing
D. Server-based phishing
19. Gwyne's company has been contacted by customers asking about a new
social media account operating under the company's brand. The social media
or work with. What type of attack best describes what Gwyne's organization has
encountered?
A. Impersonation
B. Brand impersonation
Technet24
C. Mis-branding
D. Crypto-phishing
the U.S. election in 2016 are an example of what type of social engineering?
A. Smishing
B. Pretexting
C. Disinformation
D. Spraying
Ch5
organization has already been compromised and searches for evidence of that
compromise?
A. Vulnerability scanning
B. Penetration testing
C. Threat hunting
D. War driving
2. Renee is configuring her vulnerability management solution to perform
credentialed scans of servers on her network. What type of account should she
A. Domain administrator
B. Local administrator
C. Root
D. Read-only
dangerous plug-ins. What would be the best approach for the initial scan?
results possible.
4. Which one of the following values for the CVSS attack complexity metric would
B. Medium
C. Low
D. Severe
5. Tara recently analyzed the results of a vulnerability scan report and found
that a vulnerability reported by the scanner did not exist because the system
A. False positive
B. False negative
C. True positive
D. True negative
6. Brian ran a penetration test against a school's grading system and discovered
a flaw that would allow students to alter their grades by exploiting a SQL
activity?
A. Confidentiality
B. Integrity
C. Alteration
D. Availability
7. Which one of the following security assessment tools is least likely to be used
A. Nmap
B. Nessus
C. Metasploit
D. Nslookup
8. During a vulnerability scan, Brian discovered that a system on his network
What security control, if deployed, would likely have addressed this issue?
A. Patch management
C. Intrusion detection
D. Threat hunting
vulnerability?
system and uses it to gain access to other systems on the same network. What
A. Lateral movement
B. Privilege escalation
C. Footprinting
D. OSINT
audit. The audit is being done to validate the organization's financial statements
A. External audit
B. Penetration test
C. Internal audit
D. Informal audit
participation from external security experts and reward them for discovering
vulnerabilities?
A. Threat hunting
B. Penetration testing
Technet24
C. Bug bounty
D. Vulnerability scanning
server to grant himself access in the future. What term best describes this
action?
A. Privilege escalation
B. Lateral movement
C. Maneuver
D. Persistence
B. Vulnerability scans
C. WHOIS lookups
D. Footprinting
describe vulnerabilities?
A. CPE
B. CVE
C. CVSS
D. CCE
16. Bruce is conducting a penetration test for a client. The client provided him
with full details of their systems in advance. What type of test is Bruce
conducting?
17. Lila is working on a penetration testing team and she is unsure whether she
A. Contract
B. Statement of work
C. Rules of engagement
she is targeting in a penetration test. Which one of the following techniques will
A. Port scanning
B. Footprinting
C. Vulnerability scanning
D. Packet capture
19. Kevin recently identified a new security vulnerability and computed its
CVSS base score as 6.5. Which risk category would this vulnerability fall into?
A. Low
B. Medium
C. High
D. Critical
20. Which one of the CVSS metrics would contain information about the type of
A. AV B.
C. PR
D. AC
Ch6
A. Mutation testing
D. Fuzzing
D. Implementing TLS
A. Parameterized queries
B. Encoding data
Technet24
C. Input validation
4. During a web application test, Ben discovers that the application shows SQL
B. Code exposure
C. SQL injection
5. The application that Scott is writing has a flaw that occurs when two
when the two actions do not occur in the expected order. What type of flaw
A. Dereferencing
B. A race condition
C. An insecure function
A. Continuous integration
B. Continuous delivery
C. A security nightmare
D. Agile development
B. Development
C. Staging
D. Production
code that it is not aware it is using. Which one of the following activities
B. Package monitoring
C. Static analysis
D. Dynamic analysis
9. Which one of the following is not an advantage of automation in
cybersecurity operations?
A. Enforcing baselines
B. Technical debt
C. Employee retention
10. Chris is creating a script that will automatically screen any user requests
and flag those that exceed normal thresholds for manual review. What term
A. User provisioning
B. Guard rails
C. Ticket creation
D. Escalation
satisfaction
Technet24
C. Costs
D. Complexity
12. Frank is investigating a security incident where the attacker entered a very
long string into an input field, which was followed by a system command.
C. Command injection
D. Bu er overflow
A. On-path attack
B. Session hijacking
C. Bu er overflow
D. Meet-in-the-middle
14. Tom is a software developer who creates code for sale to the public. He
would like to assure his users that the code they receive actually came from
A. Code signing
B. Code endorsement
C. Code encryption
D. Code obfuscation
15. Chris is reviewing evidence of a cross-site scripting attack where the
attacker embedded JavaScript in a URL that a user clicked. The web page then
sent the JavaScript to the user in the displayed page. What term best describes
this attack?
A. Reflected XSS
B. Stored XSS
C. Persistent XSS
D. DOM-based XSS
16. Joe checks his web server logs and sees that someone sent the following
www.mycompany.com/servicestatus.php?
serviceID=892&serviceID=892’%20;DROP%20TABLE%20Services;--
A. Cross-site scripting
B. Session hijacking
C. Parameter pollution
D. On-path
17. Upon further inspection, Joe finds a series of thousands of requests to the
same URL coming from a single IP address. Here are a few examples:
www.mycompany.com/servicestatus.php?serviceID=1
www.mycompany.com/servicestatus.php?serviceID=2
www.mycompany.com/servicestatus.php?serviceID=3
www.mycompany.com/servicestatus.php?serviceID=4
www.mycompany.com/servicestatus.php?serviceID=5
www.mycompany.com/servicestatus.php?serviceID=6
B. File upload
C. Unvalidated redirect
D. Session hijacking
18. Joe's adventures in web server log analysis are not yet complete.
A. SQL injection
B. Session hijacking
C. Directory traversal
D. File upload
19. Wendy is a penetration tester who wishes to engage in a session hijacking
attack. What information is crucial for Wendy to obtain if her attack will be
successful?
A. Session ticket
B. Session cookie
C. Username
D. User password
20. Joe is examining the logs for his web server and discovers that a user sent input
B. HTML injection
C. Cross-site scripting
Ch7
1. Mike is sending David an encrypted message using a symmetric encryption
network user to use weak encryption and was then able to decrypt that content.
A. Downgrade
B. Collision
C. Homomorphic encryption
D. Birthday attack
A. Integrity
B. Non-repudiation
C. Authentication
D. Confidentiality
posting many image files to a message board. What technique might the
Steganography
B. Homomorphic encryption
C. Replay attack
D. Birthday attack
incorrect?
B. Longer keys are better than shorter keys when the samealgorithm is used.
algorithms.
A. Block cipher
B. Bit cipher
C. Stream cipher
D. Balanced cipher
A. DES
B. 3DES
C. RSA
D. AES
8. Kevin is configuring a web server to use digital certificates. What technology
can he use to allow clients to quickly verify the status of those certificates
A. CRL
B. OCSP
C. Certificate stapling
D. Certificate pinning
9. Acme Widgets has 10 employees and they all need the ability to
A. 1
B. 2
C. 10
D. 11
asymmetric encryption algorithm, how many keys would be required to add the
11th employee?
A. 1
B. 2
C. 10
D. 11
11. What type of digital certificate provides the greatest level of assurance that
A. DV
B. OV
C. UV
D. EV
12. Glenn recently obtained a wildcard certificate for *.mydomain.com. Which one
A. mydomain.com
B. core.mydomain.com
C. dev. www.mydomain.com
D. mail.mydomain.com
13. Which one of the following servers is almost always an o line CA in a large PKI
deployment?
A. Root CA
B. Intermediate CA
C. RA
D. Internal CA
14. Which one of the following certificate formats is closely associated with
A. DER
B. PEM
C. PFX
D. P7B
15. What type of security solution provides a hardware platform for the
A. HSM
B. IPS
C. SIEM
D. SOAR
16. What type of cryptographic attack attempts to force a user to reduce the
Birthday
B. Frequency
C. Downgrade
D. Collision
17. David would like to send Mike a message using an asymmetric encryption
18. When Mike receives the message that David encrypted for him, what key