SOLUTIONS
You are responsible for incident response at Acme Corporation. You
have discovered that someone has been able to circumvent the Windows
authentication process for a specific network application. It appears that
the attacker took the stored hash of the password and sent it directly to
the backend authentication service, bypassing the application. What type
of attack is this?
A. Pass the hash
B. Evil twin
C. Hash spoofing
D. Shimming - Precise Answer ✔✔A.
You have been asked to test your company network for security issues.
The specific test you are conducting involves primarily using automated
and semiautomated tools to look for known vulnerabilities with the
various systems on your network. Which of the following best describes
this type of test?
A. Security test
B. Penetration test
C. Vulnerability scan
D. Security audit - Precise Answer ✔✔C.
,You are responsible for network security at Acme Company. Users have
been reporting that personal data is being stolen when using the wireless
network. They all insist they only connect to the corporate wireless
access point (WAP). However, logs for the WAP show that these users
have not connected to it. Which of the following could best explain this
situation?
A. Bluejacking
B. Clickjacking
C. Rogue access point
D. Session hijacking - Precise Answer ✔✔C.
Which of the following is commonly used in a distributed denial of
service (DDoS) attack?
A. Phishing
B. Adware
C. Trojan
D. Botnet - Precise Answer ✔✔D.
Frank is deeply concerned about attacks to his company's e-commerce
server. He is particularly worried about cross-site scripting and SQL
injection. Which of the following would best defend against these two
specific attacks?
,A. Encrypted web traffic
B. Filtering user input
C. A firewall
D. An IDS - Precise Answer ✔✔B.
Mike is a network administrator with a small financial services
company. He has received a popup window that states his files are now
encrypted and he must pay .5 bitcoins to get them decrypted. He tries to
check the files in question, but their extensions have changed, and he
cannot open them. What best describes this situation?
A. Mike's machine has ransomware.
B. Mike's machine has been the target of whaling.
C. Mike's machine has a rootkit.
D. Mike's machine has a logic bomb. - Precise Answer ✔✔A.
You work for a security company that performs penetration testing for
clients. You are conducting a test of an e-commerce company. You
discover that after compromising the web server, you can use the web
server to launch a second attack into the company's internal network.
What best describes this?
A. A pivot
B. White-box testing
C. Black-box testing
, D. Internal attack - Precise Answer ✔✔A.
You are the manager for network operations at your company. One of the
accountants sees you in the hall and thanks you for your team keeping
his antivirus software up to date. When you ask him what he means, he
mentions that one of your staff, named Mike, called him and remotely
connected to update the antivirus. You don't have an employee named
Mike. What has occurred?
A. Social engineering
B. IP spoofing
C. Man-in-the-middle attack
D. MAC spoofing - Precise Answer ✔✔A.
John has discovered that an attacker is trying to get network passwords
by using software that attempts a number of passwords from a list of
common passwords. What type of attack is this?
A. Brute force
B. Dictionary
C. Rainbow table
D. Session hijacking - Precise Answer ✔✔B.
Daryl is investigating a recent breach of his company's web server. The
attacker used sophisticated techniques and then defaced the website,
leaving messages that were denouncing the company's public policies.