100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEC+ CERTMASTER CE EXAM REVIEW QUESTIONS WITH CORRECT DETAILED ANSWERS

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
12-02-2025
Written in
2024/2025

SEC+ CERTMASTER CE EXAM REVIEW QUESTIONS WITH CORRECT DETAILED ANSWERS Spyware infected the computers. -Answer-End-users at an organization contact the cybersecurity department and report that, after downloading a file, they are being redirected to shopping websites to which they did not intend to navigate, and built-in webcams turn on. The security team confirms the issue as malicious, and notes modified DNS (Domain Name System) queries that go to nefarious websites hosting malware. What most likely happened to the users' computers? A Remote Access Trojan (RAT) -Answer-An attacker installs Trojan malware that can execute remote backdoor commands, such as the ability to upload files and install software to a victim PC. What type of Trojan malware is this? Password spraying attack -Answer-A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwords in conjunction with multiple usernames. What specific type of password attack is the hacker most likely performing? -Dictionary attack -Rainbow table -Answer-An attacker can exploit a weakness in a password protocol to calculate the hash of a password. Which of the following methods can an attacker match a hash to, as a means to obtain a means of authentication? (Select all that apply.) A rainbow table attack -Answer-Which of the following attacks do security professionals expose themselves to, if they do not salt passwords with a random value? Clone it. -Answer-What does an attacker need to do to use acquired user and account details from a user's smart card? Skimming -Answer-What type of attack is occurring when a counterfeit card reader is in use? The user installed Trojan horse malware. -Answer-A user used an administrator account to download and install a software application. After the user launched the .exe extension installer file, the user experienced frequent crashes, slow computer performance, and strange new services running when turning on the computer. It seems like there are more and more services running over time. What most likely happened to cause these issues? Cross-site scripting (XSS) -Answer-An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application's root directory. This scenario is describing which type of attack? DLL injection -Answer-An attacker escalated privileges to a local administrator and used code refactoring to evade antivirus detection. The attacker then allowed one process to attach to another and forced the operating system to load a malicious binary package. What did the attacker successfully perform? LDAP injection -Answer-Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain controllers. The attacker initiated the query from a client computer. What type of injection attack did the attacker perform? An incorrectly coded process can alter the execution environment to create a null pointer, and crash the program. -Answer-How can the lack of logic statement tests on memory location variables be detrimental to software in development? A buffer overflow -Answer-An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions? Race condition -Answer-Developers found a "time of check to time of use" (TOCTTOU) vulnerability in their application. The vulnerability made it possible to change temporary data created within the app before the app uses the data later. This vulnerability is taking advantage of what process in the application? Cuckoo -Answer-A malware expert wants to examine a new worm that is infecting Windows devices. Verify the sandbox tool that will enable the expert to contain the worm and study it in its active state. Revealing database server configuration -Answer-A web application's code prevents the output of any type of information when an error occurs during a request. The development team cited security reasons as to why they developed the application in this way. What sort of security issues did the team have concerns about in this case? Replay attack -Answer-An intruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimately establishes a session with a web server. What type of attack can the intruder perform with the cookie file? Server-side request forgery -Answer-An attacker submitted a modified uniform resource locator (URL) link to a website that eventually established connections to back-end databases and exposed internal service configurations. The attacker did not hijack a user to perform this attack. This describes which of the following types of attacks?

Show more Read less
Institution
SEC+ CERTMASTER CE
Course
SEC+ CERTMASTER CE









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SEC+ CERTMASTER CE
Course
SEC+ CERTMASTER CE

Document information

Uploaded on
February 12, 2025
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEC+ CERTMASTER CE EXAM
REVIEW QUESTIONS WITH
CORRECT DETAILED ANSWERS

Spyware infected the computers. -Answer-End-users at an organization contact the
cybersecurity department and report that, after downloading a file, they are being
redirected to shopping websites to which they did not intend to navigate, and built-in
webcams turn on. The security team confirms the issue as malicious, and notes
modified DNS (Domain Name System) queries that go to nefarious websites hosting
malware. What most likely happened to the users' computers?

A Remote Access Trojan (RAT) -Answer-An attacker installs Trojan malware that can
execute remote backdoor commands, such as the ability to upload files and install
software to a victim PC. What type of Trojan malware is this?

Password spraying attack -Answer-A hacker is trying to gain remote access to a
company computer by trying brute force password attacks using a few common
passwords in conjunction with multiple usernames. What specific type of password
attack is the hacker most likely performing?

-Dictionary attack
-Rainbow table -Answer-An attacker can exploit a weakness in a password protocol to
calculate the hash of a password. Which of the following methods can an attacker
match a hash to, as a means to obtain a means of authentication? (Select all that
apply.)

A rainbow table attack -Answer-Which of the following attacks do security professionals
expose themselves to, if they do not salt passwords with a random value?

Clone it. -Answer-What does an attacker need to do to use acquired user and account
details from a user's smart card?

Skimming -Answer-What type of attack is occurring when a counterfeit card reader is in
use?

The user installed Trojan horse malware. -Answer-A user used an administrator account
to download and install a software application. After the user launched the .exe
extension installer file, the user experienced frequent crashes, slow computer
performance, and strange new services running when turning on the computer. It seems
like there are more and more services running over time. What most likely happened to
cause these issues?

, Cross-site scripting (XSS) -Answer-An attacker discovered an input validation
vulnerability on a website, crafted a URL with additional HTML code, and emailed the
link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking
on the malicious URL. No other malicious operations occurred outside of the web
application's root directory. This scenario is describing which type of attack?

DLL injection -Answer-An attacker escalated privileges to a local administrator and used
code refactoring to evade antivirus detection. The attacker then allowed one process to
attach to another and forced the operating system to load a malicious binary package.
What did the attacker successfully perform?

LDAP injection -Answer-Using an open connection to a small company's network, an
attacker submitted arbitrary queries on port 389 to the domain controllers. The attacker
initiated the query from a client computer. What type of injection attack did the attacker
perform?

An incorrectly coded process can alter the execution environment to create a null
pointer, and crash the program. -Answer-How can the lack of logic statement tests on
memory location variables be detrimental to software in development?

A buffer overflow -Answer-An attacker gained remote access to a user's computer by
exploiting a vulnerability in a piece of software on the device. The attacker sent data
that was able to manipulate the return address that is reserved to store expected data.
Which vulnerability exploit resulted from the attacker's actions?

Race condition -Answer-Developers found a "time of check to time of use" (TOCTTOU)
vulnerability in their application. The vulnerability made it possible to change temporary
data created within the app before the app uses the data later. This vulnerability is
taking advantage of what process in the application?

Cuckoo -Answer-A malware expert wants to examine a new worm that is infecting
Windows devices. Verify the sandbox tool that will enable the expert to contain the
worm and study it in its active state.

Revealing database server configuration -Answer-A web application's code prevents the
output of any type of information when an error occurs during a request. The
development team cited security reasons as to why they developed the application in
this way. What sort of security issues did the team have concerns about in this case?

Replay attack -Answer-An intruder monitors an admin's unsecure connection to a server
and finds some required data, like a cookie file, that legitimately establishes a session
with a web server. What type of attack can the intruder perform with the cookie file?

Server-side request forgery -Answer-An attacker submitted a modified uniform resource
locator (URL) link to a website that eventually established connections to back-end
databases and exposed internal service configurations. The attacker did not hijack a
user to perform this attack. This describes which of the following types of attacks?
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Mindscholars

Get to know the seller

Seller avatar
Mindscholars Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
10 months
Number of followers
0
Documents
74
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions