FEDVTE Cyber Dark Arts 2024-2025
Edition. Questions and Correct, Verified
Answers. Graded A+
A legitimate use for anonymous web search engines is to receive unbiased search
results. - ANSTrue
Because of ProtonMail's "zero access architecture" where the message sender encrypts
using the recipient's public key, and the recipient decrypts with their private key, this
encrypted messaging service can only be exchanged between ProtonMail users. -
ANSFalse
Communication exchanges with a Command and Control, or C2 server, to register and
receive further instructions is generally going to appear as network traffic using which
protocol? - ANSHTTP
In an advanced persistent threat, once access is gained, which of the following are likely
to occur? - ANSAll of the Above
Incognito mode or private browsing hides web activities from which of the following? -
ANSThe local system
Malicious users leverage E2E encryption services to evade security controls and
successfully hide deceptive or illegal data from detection and surveillance. This problem
is known as: - ANSGoing Dark
Only law enforcement and intelligence organizations can legally use anonymous
browsers like ToR. - ANSFalse
Password cracking tools use wordlist dictionaries containing commonly used passwords
in an attempt to gain access using a brute force attack. These wordlists must be
downloaded separately from the tool due to the frequency the list is updated. -
ANSFalse
Qubes achieves greater security by allowing the user to run applications and store files
in: - ANSIsolated containers
Sites on the dark web can't be reached using traditional web browsers because access
is blocked via black lists that are constantly updated. - ANSFalse
Social engineering, specifically Phishing, has become a much less effective attack type
due to increased awareness in the cyber community, and advancements in detection
tools. - ANSFalse
Edition. Questions and Correct, Verified
Answers. Graded A+
A legitimate use for anonymous web search engines is to receive unbiased search
results. - ANSTrue
Because of ProtonMail's "zero access architecture" where the message sender encrypts
using the recipient's public key, and the recipient decrypts with their private key, this
encrypted messaging service can only be exchanged between ProtonMail users. -
ANSFalse
Communication exchanges with a Command and Control, or C2 server, to register and
receive further instructions is generally going to appear as network traffic using which
protocol? - ANSHTTP
In an advanced persistent threat, once access is gained, which of the following are likely
to occur? - ANSAll of the Above
Incognito mode or private browsing hides web activities from which of the following? -
ANSThe local system
Malicious users leverage E2E encryption services to evade security controls and
successfully hide deceptive or illegal data from detection and surveillance. This problem
is known as: - ANSGoing Dark
Only law enforcement and intelligence organizations can legally use anonymous
browsers like ToR. - ANSFalse
Password cracking tools use wordlist dictionaries containing commonly used passwords
in an attempt to gain access using a brute force attack. These wordlists must be
downloaded separately from the tool due to the frequency the list is updated. -
ANSFalse
Qubes achieves greater security by allowing the user to run applications and store files
in: - ANSIsolated containers
Sites on the dark web can't be reached using traditional web browsers because access
is blocked via black lists that are constantly updated. - ANSFalse
Social engineering, specifically Phishing, has become a much less effective attack type
due to increased awareness in the cyber community, and advancements in detection
tools. - ANSFalse