Questions WITH ANSWERS |\ |\
A user used an administrator account to download and
|\ |\ |\ |\ |\ |\ |\ |\ |\
install a software application. After the user launched the
|\ |\ |\ |\ |\ |\ |\ |\
.exe extension installer file, the user experienced
|\ |\ |\ |\ |\ |\ |\ |\
frequent crashes, slow computer performance, and
|\ |\ |\ |\ |\ |\
strange services running when turning on the computer.
|\ |\ |\ |\ |\ |\ |\ |\
What most likely happened to cause these issues? -
|\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔The user installed Trojan horse |\ |\ |\ |\ |\ |\ |\
malware.
A security operations center (SOC) analyst investigates
|\ |\ |\ |\ |\ |\ |\
the propagation of a memory-resident virus across the
|\ |\ |\ |\ |\ |\ |\ |\
network and notices a rapid consumption of network
|\ |\ |\ |\ |\ |\ |\ |\
bandwidth, causing a Denial of Service (DoS). What type |\ |\ |\ |\ |\ |\ |\ |\ |\
of virus is this? - CORRECT ANSWERS ✔✔A worm
|\ |\ |\ |\ |\ |\ |\ |\
A user purchased a laptop from a local computer shop.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
After powering on the laptop for the first time, the user
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
noticed a few programs like Norton Antivirus asking for
|\ |\ |\ |\ |\ |\ |\ |\ |\
permission to install. How would an IT security specialist |\ |\ |\ |\ |\ |\ |\ |\ |\
classify these programs? - CORRECT ANSWERS ✔✔PUP
|\ |\ |\ |\ |\ |\ |\
(potentially unwanted program) |\ |\
,A fileless malicious software can replicate between
|\ |\ |\ |\ |\ |\ |\
processes in memory on a local host or over network |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
shares. What other behaviors and techniques would
|\ |\ |\ |\ |\ |\ |\
classify malware as fileless rather than a normal virus?
|\ |\ |\ |\ |\ |\ |\ |\ |\
(Select all that apply.) - CORRECT ANSWERS ✔✔-Uses
|\ |\ |\ |\ |\ |\ |\ |\
lightweight shellcode |\
-Uses low observable characteristic attacks
|\ |\ |\ |\
An attacker is planning to set up a backdoor that will
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
infect a set of specific computers at an organization, to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
inflict a set of other intrusion attacks remotely. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the following will support the attackers' plan? (Select all
|\ |\ |\ |\ |\ |\ |\ |\ |\
that apply.) - CORRECT ANSWERS ✔✔-Computer Bots,
|\ |\ |\ |\ |\ |\
-Command & Control |\ |\
If a user's computer becomes infected with a botnet,
|\ |\ |\ |\ |\ |\ |\ |\ |\
which of the following can this compromise allow the
|\ |\ |\ |\ |\ |\ |\ |\ |\
attacker to do? (Select all that apply.) - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔-Launch a Distributed Denial of Service |\ |\ |\ |\ |\ |\ |\
(DDoS) attack |\
-Establish a connection with a Command and Control
|\ |\ |\ |\ |\ |\ |\ |\
server
-Launch a mass-mail spam attack |\ |\ |\ |\
If a user's device becomes infected with crypto-malware,
|\ |\ |\ |\ |\ |\ |\ |\
which of the following is the best way to mitigate this
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
,compromise? - CORRECT ANSWERS ✔✔Have up-to-date |\ |\ |\ |\ |\ |\
backups.
A security specialist discovers a malicious script on a
|\ |\ |\ |\ |\ |\ |\ |\ |\
computer. The script is set to execute if the |\ |\ |\ |\ |\ |\ |\ |\ |\
administrator's account becomes disabled. What type of |\ |\ |\ |\ |\ |\ |\
malware did the specialist discover? - CORRECT |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔A logic bomb |\ |\ |\
End-users at an organization contact the cybersecurity |\ |\ |\ |\ |\ |\ |\
department. After downloading a file, they are being |\ |\ |\ |\ |\ |\ |\ |\
redirected to shopping websites they did not intend to |\ |\ |\ |\ |\ |\ |\ |\ |\
navigate to, and built-in webcams turn on. The security
|\ |\ |\ |\ |\ |\ |\ |\ |\
team confirms the issue as malicious, and notes modified
|\ |\ |\ |\ |\ |\ |\ |\ |\
DNS (Domain Name System) queries that go to nefarious
|\ |\ |\ |\ |\ |\ |\ |\ |\
websites hosting malware. What most likely happened to
|\ |\ |\ |\ |\ |\ |\ |\
the users' computers? - CORRECT ANSWERS ✔✔Spyware
|\ |\ |\ |\ |\ |\ |\
infected the computers. |\ |\
An attacker installs Trojan malware that can execute
|\ |\ |\ |\ |\ |\ |\ |\
remote backdoor commands, such as the ability to upload
|\ |\ |\ |\ |\ |\ |\ |\
files and install software to a victim PC. What type of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Trojan malware is this? - CORRECT ANSWERS ✔✔A
|\ |\ |\ |\ |\ |\ |\ |\
Remote Access Trojan (RAT) |\ |\ |\
A hacker is trying to gain remote access to a company
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
computer by trying brute force password attacks using a |\ |\ |\ |\ |\ |\ |\ |\ |\
, few common passwords in conjunction with multiple
|\ |\ |\ |\ |\ |\ |\
usernames. What specific type of password attack is the |\ |\ |\ |\ |\ |\ |\ |\ |\
hacker most likely performing? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\
✔✔Password spraying attack |\ |\
An attacker can exploit a weakness in a password
|\ |\ |\ |\ |\ |\ |\ |\ |\
protocol to calculate the hash of a password. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
following can the attacker match the hash to, as a means
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
to obtain the password? (Select all that apply.) -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔-A rainbow table |\ |\ |\ |\
-A dictionary word
|\ |\
Which of the following attacks do security professionals
|\ |\ |\ |\ |\ |\ |\ |\
expose themselves to, if they do not salt passwords with
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a random value? - CORRECT ANSWERS ✔✔A rainbow
|\ |\ |\ |\ |\ |\ |\ |\
table attack |\
How can an attacker make unauthorized use of acquired
|\ |\ |\ |\ |\ |\ |\ |\ |\
user and account details from a user's smart card? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔Clone it. |\ |\ |\
What type of attack is occurring when a counterfeit card
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
reader is in use? - CORRECT ANSWERS ✔✔Skimming
|\ |\ |\ |\ |\ |\ |\
An attacker discovered an input validation vulnerability
|\ |\ |\ |\ |\ |\ |\
on a website, crafted a URL with additional HTML code,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\