Security+ prerequisites Exam Latest Updated 2024 With Complete Solutions
Security+ prerequisites Exam Latest Updated 2024 With Complete Solutions What is the least likely motivator of a black-hat hacker in today's cyber world. - Notoriety What terms would represent a potential unstructured internal threat or vulnerability. - No enforced AUP Accidental and non malicious Poor security awareness training Using unprovisioned USB drive brought from home Statement that best represents a potential internal structure threat - Running Kali Linux from a USB flash drive o a corporate workstation. Statements describe a threat actor or agent with sophistication, resources and extensive funding to launch attacks. - A member of a crime syndicate in Eastern Europe A member of a well-established hacktivist group A state sponsored employee of a rogue nation The owner of a Malware-as-a-service cloud provider in the dark web. Neutrino, Sundown, Magnitude, RIG EK - Popular exploit kits. Term describes a person, method, operation, technique, or entity that has the potential to initial, transport, carry out, or in any way support a particular exploit. - Threat Agent Considered types of security controls commonly used to countermeasure attacks and threats. - Technical, Physical, Managerial(Administrative) Describes a competitor as a potential threat. - They can do sabotage to destroy stock value. They can perform espionage to steal intellectual property(IP). Describe the characteristics of an advanced Persistent threats(APT) - They often perform cost/benefit analysis before selecting targets. They are known for bleeding edge, stealth malware and zero-days. They are unrelenting and focused, often with a long-term strategy. What does the use of a program like Wireshark allow you to do? - Capture network packets View details of malware code What does TOR stand for? - The Onion Router. Term describes the malware that bundles up different types of malicious code into a single package and delivers it in an email attachment. - Polymorphic packer What category of malware can actually be an entire operating system, smart device, gaming system, or even an automobile. - Spyware What is a specific form of malware, often part of multistaged exploits, that is known for creating backdoors to C&C servers giving crackers access to a system. - RAT Which statement is false regarding keyloggers - They can all evade special-onscreen keyboard software Which specific form of malicious software is often used to generate a covert channel so that the remote attacker can access and control the system even on phones and other mobile devices. - Backdoor What is it called when crypto malware is delivered when a user innocently visits an infected web site and downloads and installs it without their knowledge. - Drive-by When searching the Common Vulnerabilities and Exposure(CVE) lists National Vulnerability Database(NVD), what scoring information is provided for each vulnerability? - Exploitability Subscore CVSS Base Score Impact Subscore
Escuela, estudio y materia
- Institución
- Security+ prerequisites
- Grado
- Security+ prerequisites
Información del documento
- Subido en
- 24 de julio de 2024
- Número de páginas
- 87
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
- security prerequisites
-
security prerequisites exam latest updated 2024
-
security prerequisites exam