1 Mark is authorized to access the company data center and can get in by using his RFID badge. Randy from facilities, who isn’t authorized to access the data center, just followed Mark into the data center without Mark’s knowledge. What is Randy guilty of? Tailgating Identity fraud Phishing Vishing You answered this question correctly.× Explanation: Tailgating involves piggybacking, or following closely behind someone who has authorized physical access. Vishing and phishing are incorrect because vishing involves using a phone to obtain information, and phishing is an attempt to acquire sensitive information by masquerading as a trustworthy entity via an electronic communication, usually email. Identity fraud is incorrect because identity fraud is the use of a person’s personal information, without authorization, to deceive or commit a crime. If Randy had stolen Mark’s RFID badge to enter the server room, he would possibly be guilty of identity fraud. You are a security analyst for your organization. A user tells you that someone from the FBI called her and asked for her username and password. What principle of influence (reason for effectiveness) has been employed against the user to gain her credentials? Urgency Scarcity Authority Familiarity/liking You answered this question correctly.× Explanation: Job titles, uniforms, symbols, badges, and even specific expertise are all elements we often equate with authority. The perpetrator in this example used authority (the FBI) to influence the user into giving up her credentials. The other answers are incorrect. Scarcity is commonly used as a marketing ploy (sometimes more effectively than at other times), such as to say that special pricing is available to only the first 50 callers. We tend to want or value something more if we believe it is less available. We are likely to be more impulsive if we believe something is the last one. A social engineer might use the principle of scarcity to spur someone to quickly act on a request instead of giving the request more thought. The social engineer can use urgency to gain support. Perhaps dreadful consequences will occur unless action takes place immediately. People tend to comply with requests from those whom they like or have common ground with. Liking often leads to trust. A social engineer might try to use humor or connect more personally through shared interests or common past events and institutions. A user misspells the URL for a travel website and is taken to a competing website. What has occurred here? Typo squatting Watering hole attack Influence campaign Hoax You answered this question correctly.× Explanation: Typo squatting, also known as URL hijacking, is a simple method used frequently for benign purposes, but it is also sometimes used for malicious reasons. Typo squatting most commonly relies on typographic errors users make on the Internet. Hoax is incorrect. A hoax presents a threat, but the threat does not actually exist at face value. Instead, the actions people take in response to the perceived threat create the actual threat. Influence campaign is incorrect because an influence campaign involves coordinated actions that seeks to affect the development, actions, and behavior of the targeted population. Watering hole attack is incorrect. A watering hole attack is commonly used in conjunction with a zero-day exploit—an attack against a vulnerability that is unknown to software and security vendors. By taking advantage of a cross-site scripting vulnerability on the visited site, which allows the attacker to execute scripts in the victim’s web browser, the attacker can ensure that the trusted site helps deliver an exploit to the victim’s machine. Trent asks you what is the difference between a worm and virus. How would you best explain the difference to him? Worms self-replicate without a host file. Worms are programs disguised as useful applications. A worm is also known as a remote access Trojan (RAT). A stealth worm is memory resident and uses techniques to avoid detection. You answered this question correctly.× Explanation: Worms are similar in function and behavior to viruses, with one exception: Worms are selfreplicating and do not need a host file. A worm is built to take advantage of a security hole in an existing application or operating system, and then it finds other systems running the same software and automatically replicates itself to the new host. “Worms are programs disguised as useful applications” is incorrect. Trojans, or Trojan horses, are programs disguised as useful applications. Trojans do not replicate themselves as viruses do, but they can be just as destructive. “A stealth worm is memory resident and uses techniques to avoid detection” is incorrect. A stealth virus is memory resident and uses techniques to avoid detection, such as temporarily removing itself from an infected file or masking a file’s size. “A worm is also known as a remote access Trojan (RAT)” is incorrect because a backdoor Trojan is also known as a remote access Trojan (RAT). RATs installed on a system allow a remote attacker to take control of the targeted system. Carol is reading about a newer attack type that resides in memory and uses the system’s own vulnerable services and programs such as Windows PowerShell or WMI to allow the attacker to infiltrate the system. What type of malware is she reading about? Logic bomb Trojan Fileless malware Worm You answered this question correctly.× Explanation: A more recent virus type known as fileless malware is much like a memory-resident virus but more insidious. While the latter still requires some components of the virus to be written to disk, a fileless virus does not. Such a virus “lives off the land” and uses legitimate tools that are usually part of the operating system or development packages to do their work, such as Windows PowerShell, Windows Management Instrumentation (WMI), and macros. Trojan is incorrect. Trojans are programs disguised as useful applications. Trojans do not replicate themselves as viruses do, but they can be just as destructive. Worm is incorrect. A worm is similar in function and behavior to a virus, with one exception: Worms are self-replicating and do not need a host file. Logic bomb is incorrect because a logic bomb is a virus or Trojan horse designed to execute malicious actions when a certain event occurs or after a certain period of time. The following message appears on your display. What is this an example of? Ransomware Crypto-malware Machine learning Artificial intelligence Select 2 answers You answered this question correctly.× Explanation: Crypto-malware is specifically designed to find potentially valuable data on a system and uses cryptography to encrypt the data to prevent access. The decryption key is then required to access the data. Crypto-malware is often associated with ransomware. Ransomware is a form of malware that attempts to hold a user ransom, often for monetary gain. In this case, the attacker will provide the decryption key only after payment has been made. The attacker typically has already compromised a system and demands payment to prevent negative consequences such as deleting files. Payment is typically demanded in cryptocurrency such as Bitcoin. Artificial intelligence and machine learning are incorrect because artificial intelligence (AI) applies various techniques that solve a variety of problems and challenges. Machine learning (ML) is one of the key techniques used in AI. With machine learning, as its name implies, a machine is able to learn. Malicious code is inserted into a running process, taking advantage of instructions that call upon other programs designed for the running application to load at runtime. What attack is occurring here? XML injection SQL injection LDAP injection DLL injection You answered this question correctly.× Explanation: DLL injection involves inserting malicious code into a running process. This technique takes advantage of dynamic link libraries (DLLs), which are designed for the running application to load at runtime. A successful attack occurs when the legitimate process hooks into the malicious DLLs and then runs them. SQL injection is incorrect. In an SQL injection attack, malicious code is inserted into strings that are later passed to a database server. The SQL server then parses and executes this code. LDAP injection is incorrect. An LDAP injection attack is similar to SQL injection, but malicious input is applied to a directory server, which may result in unauthorized queries, granting of permissions, and even password changes. XML injection is incorrect. In an XML injection attack, an attacker can manipulate the logic of an application in order to perform unauthorized activity or gain unauthorized access by inserting content into an Extensible Markup Language (XML) message. For the Security+ exam, remember that LDAP injections target directory servers, XML and DLL injections target applications, and SQL injections target databases. An attacker has captured packets by using a sniffer, extracted pertinent information, and placed the packets back on the network. What type of attack is this? SSL stripping Replay attack API attack Race condition You answered this question correctly.× Explanation: In a replay attack, the attacker captures packets by using sniffers. After extracting the pertinent information, the attacker places the packets back on the network. This type of attack can be used to replay bank transactions or other similar types of data transfer in the hopes of replicating or changing activities such as deposits or transfers. SSL stripping is incorrect. With Secure Sockets Layer (SSL) stripping, the attacker strips or removes the encryption between the client and the website. Acting as a proxy or go-between, however, the attacker establishes a secure connection between himself and the server. API attack is incorrect. An application programming interface (API) attack involves hostile use of an API. APIs are so pervasive across web applications that OWASP now publishes an annual list for API security. Race condition is incorrect because a race condition relates to the way a program executes sequences of code. What can an attacker use to hijack a user’s session or cause the user accessing malware-tainted Site A to unknowingly attack Site B on behalf of the attacker who planted code on Site A? OWASP Input validation Pass the hash XSS You answered this question correctly.× Explanation: Cross-site scripting (XSS) attacks place malicious scripts on trusted websites. XSS vulnerabilities can be used to hijack a user’s session or to cause the user accessing malwaretainted Site A to unknowingly attack Site B on behalf of the attacker who planted code on Site A. Pass the hash is incorrect. In a pass the hash attack, the attacker does not need access to a user’s password. Instead, the attacker needs only the hashed value of the password. This attack is performed against systems that accept specific implementations of authentication schemes known as LAN Manager (LM) or New Technology LAN Manager (NTLM). OWASP is incorrect. The Open Web Application Security Project (OWASP) is a foundation that works to improve software security. It annually publishes the OWASP Top 10 for web application security risks. Input validation is incorrect because input validation is the structured testing of input to ensure that data is properly formatted before it is used in applications or programs. Which of the following are true statements regarding PowerShell and Python? PowerShell is a command-line shell and scripting interface for Microsoft Windows environments. PowerShell files use the file extension .ps1. PowerShell is a general-purpose programming language available on many Linux distributions and Apple’s macOS. PowerShell files use the file extension .py. Python is a command-line shell and scripting interface for Microsoft Windows environments. The Python file extension is .ps1. Python is a general-purpose programming language available on many Linux distributions and Apple’s macOS. The Python file extension is .py. Select 2 answers You answered this question correctly.× Explanation: Applications and development environments may include their own shell environments. For example, PowerShell is a command-line shell and scripting interface for Microsoft Windows environments. PowerShell files use the file extension .ps1. Python is a general-purpose programming language available on many Linux distributions and Apple’s macOS. The Python file extension is .py. The other two statements are invalid. Which of the following are considered Layer 2 attacks? Media access control (MAC) spoofing Address Resolution Protocol (ARP) poisoning Port stealing Malicious script execution Select 3 answers You answered this question correctly.× Explanation: Layer 2 is the second layer of the Open Systems Interconnection (OSI) model for computer networks. This layer is responsible for transferring data between systems on a local network. Port stealing (at Layer 2) is a man-in-the-middle attack that exploits the binding between a port and a MAC address. In port stealing, an attacker sends numerous packets with the source IP address of the victim and the destination MAC address of the attacker. This attack applies to broadcast networks built from switches. MAC spoofing (at Layer 2) is a method of providing false identity information to gain unauthorized access. Spoofing a MAC address is a method of changing the built-in MAC address (factory assigned to each network interface) of a networked device, which is hard-coded. ARP poisoning (at Layer 2) is an attack in which a perpetrator tricks a device into thinking any IP address is related to any MAC address. In addition, perpetrators can broadcast a fake or spoofed ARP reply to an entire network and poison all computers. Malicious script execution is incorrect because malicious script execution is not a specific OSI Layer 2 type of attack. Scripts aid system administrators in efficiently performing operations and automating actions that would otherwise require multiple steps and manual interaction. This benefit provides an attacker with the same outcomes but for nefarious purposes. These scripting languages can be used as part of malware and can be used once inside a network to further the malicious work. Which of the following is a Trojan that infects web browser components such as browser plugins and is particularly dangerous because everything occurs at the application level on the user’s system? MITB Port stealing MITM ARP poisoning You answered this question correctly.× Explanation: A man-in-the-browser (MITB) attack is a Trojan that infects web browser components such as browser plug-ins and other browser helper objects. MITB attacks are particularly dangerous because everything occurs at the application level on the user’s system. These attacks are capable of avoiding web application controls that might otherwise be alerted to a traditional man-in-themiddle (MITM) attack at the network layer, so MITM is incorrect. Recently, MITB and MITM attacks have become known as on-path attacks, as attackers place themselves in the middle of two devices to intercept communications between them. ARP poisoning and port stealing are incorrect. Address Resolution Protocol (ARP) poisoning is limited to attacks that are locally based, so an intruder needs either physical access to the network or control of a device on the local network. A lesser vulnerability of ARP is port stealing. Port stealing is a MITM attack that exploits the binding between the port and the media access control (MAC) address. The principle behind port stealing is that an attacker sends numerous packets with the source IP address of the victim and the destination MAC address of the attacker. This attack applies to broadcast networks built using switches. What deception technology is used to make a honeypot look as enticing as possible to an attacker? Fake telemetry Fog computing Edge computing Hybrid You answered this question correctly.× Explanation: Deception technologies such as fake telemetry are used to lure attackers to honeypots and honeynets. For example, a honeypot may be configured to look like a regular system in full operation with user logins, running services, and the like. Fog computing and edge computing are incorrect. Fog computing and edge computing are essentially the same. The fog computing concept, developed by Cisco, basically describes the operations that occur between end devices called nodes (switches, routers, controllers, video cameras, and so on) and storage locations where the data will eventually be stored (for example, in cloud or on-premises data centers). Hybrid is incorrect. Hybrid can mean hybrid cloud or hybrid warfare, neither of which are directly related to the deception technology provided in the given example. Which of the following best describes a disgruntled or careless employee? Criminal syndicate Insider threat CVE Script kiddie You answered this question correctly.× Explanation: Insider threat actors can be malicious, as in the case of a disgruntled employee, or simply careless. In many cases, insider threat actors are employees who have the right intentions but either are unaware of an organization’s security policy or simply ignore it. Script kiddie is incorrect because script kiddies do not normally possess great talent. However, even with few skills, they can run exploits that others have developed. Usually script kiddies cannot write sophisticated code and might not even know how to program. Still, script kiddies can undoubtedly have a huge negative impact on an organization. Criminal syndicate is incorrect because a criminal syndicate is sophisticated and has adequate financial means. In fact, organized crime itself has established its own complete economy, including an underground system that affects information security. The Organized Crime Control Act indicates that funding comes from illegal activities such as gambling, loan sharking, property theft, distribution of drugs, and other forms of social exploitation. Organized criminal syndicates have simply adapted to become organized cybercriminals. CVE is incorrect. Common Vulnerabilities and Exposures (CVE) is a publicly available list of known cybersecurity vulnerabilities. Each entry in the CVE includes an ID number, decryption, and reference for more information. Which of the following is a standardized and structured language that represents threat information in a flexible, automatable, and easy-to-use manner? AIS STIX TAXII TTP You answered this question correctly.× Explanation: Structured Threat Information eXpression (STIX) is a standardized and structured language that represents threat information in a flexible, automatable, and easy-to-use manner. Answer A is incorrect. Trusted Automated eXchange of Indicator Information (TAXII) is a specification for machine-to-machine communications that allows organizations to share security information with others, as desired. AIS is incorrect. Automated Indicator Sharing (AIS) is an initiative from the U.S. Department of Homeland Security (DHS) that enables the exchange of cybersecurity threat indicators using the STIX and TAXII standards. TTP is incorrect. Adversary Tactics, Techniques and Procedures (TTP) is an approach that provides attack methods and activities associated with specific threat actors. Your company is losing money with every passing minute because a critical web server is not running. During your analysis of the web server, you notice that various services are not running, and you are not sure what they are for. What should be done in this scenario? Enable only the necessary server and web services Open all closed ports on the web server Document all actions and outcomes Enable all services on the web server Select 2 answers You did not answer this question completely correctly. The fully correct answer is indicated above.× Explanation: Although time is of the essence in this scenario, you should take the time to enable only the necessary server and web services needed to get the web server running. As good practice dictates, you should always document all actions and outcomes. In this scenario, you should document what you did to get the web server up and running for future reference. The other answers are incorrect because it is never good practice to enable all services on a system, especially when you are unsure of their purposes. Also, each additional unnecessary service or open port could carry additional flaws that might go unnoticed. Why should you change the default credentials in older equipment? To avoid log aggregation To avoid false positives To harden avenues for attack To meet contractual requirements of hardware vendors You answered this question correctly.× Explanation: Default credentials and unmonitored accounts such as the guest or admin accounts commonly established in older equipment and software soften security because they give attackers one component of access credentials. “To meet contractual requirements of hardware vendors” is incorrect. Contractual requirements of hardware vendors do not normally include changing credentials, although doing so is often advised by vendors. “To avoid log aggregation” is incorrect. Log aggregation is the process by which security information and event management (SIEM) systems combine similar events to reduce event volume. “To avoid false positives” is incorrect because a false positive occur when a security scanner detects or flags an attack or vulnerability when no attack or vulnerability exists. Which of the following are weak configurations that can increase the likelihood of vulnerabilities? Default accounts Open ports Secured root accounts Unneeded apps and services Select 3 answers You answered this question correctly.× Explanation: Unneeded applications and services provide additional avenues for attackers, especially if default accounts aren’t removed or changed. These apps and services also leave open ports, providing another vector for reconnaissance and attack. Secured root accounts is incorrect. Secured root (Linux) and administrator (Windows) accounts represent strong configurations. An unsecured root or administrator account could have a serious impact on the entire system and anything it’s connected to. What is the term for the process by which SIEM systems combine similar events into a log to reduce event volume and consolidate data so that crucial events are not missed? Log aggregation Maneuvering Threat hunting SIEM dashboard You answered this question correctly.× Explanation: Log aggregation is the process by which security information and event management (SIEM) systems combine similar events to reduce event volume. SIEMs can aggregate data into log format from many network sources and consolidate the data so that crucial events are not missed. SIEM dashboard is incorrect because a SIEM dashboard contains multiple views that allow you visualize and monitor patterns and trends. Maneuvering is incorrect. Maneuvering allows a security team to completely disrupt an attacker or quickly mitigate an attacker’s ability to move across the attack chain. The threat hunting process combined with knowledge of the cyber kill chain allows a security analyst to quickly outmaneuver an attacker. Threat hunting is incorrect because threat hunting is a proactive approach to finding an attacker before alerts are triggered. Rinaldo wants to run a scan to find more information and determine the complete vulnerability status with greater certainty. What type of scan should he run? Credentialed scan Boolean logic scan Non-credentialed scan WORM scan You answered this question correctly.× Explanation: With a credentialed scan (using, for example, a username and password), the system can ascertain more information, which results in a more complete vulnerability status with greater certainty. Non-credentialed scan is incorrect because a non-credentialed scan is less invasive and provides an outsider’s point of view. Both credentialed and non-credentialed scans can mistakenly identify a vulnerability when none exists. WORM scan is incorrect. WORM (write once, read many) drives keep log data protected so that evidence cannot be altered. WORM drives permanently protect administrative data. Boolean logic scan is incorrect. Boolean logic is a data type based on algebraic equations that produce either a true or false value. You are a security analyst for a large social media company and are currently tasked with assessing vulnerabilities. What two catalogs of known vulnerabilities should you be familiar with? SOAR CVSS Syslog CVE Select 2 answers You answered this question correctly.× Explanation: Vulnerability scanners rely heavily on catalogs of known vulnerabilities. The two catalogs of known vulnerabilities you need to be familiar with as a security analyst are Common Vulnerabilities and Exposures (CVE), which is a list of publicly known vulnerabilities containing an ID number, description, and reference, and Common Vulnerability Scoring System (CVSS), which provides a score from 0 to 10 that indicates the severity of a vulnerability. SOAR is incorrect. Security orchestration, automation, and response (SOAR) tools can aggregate intelligence from internal and external sources to provide fusion analysis and more. SOAR integrates all of the security tools available in an organization and automates incident responses. Syslog is incorrect. Syslog is a decades-old standard for message logging. It is available on most network devices (such as routers, switches, and firewalls), as well as printers and Unix/Linux based systems. Over a network, a syslog server listens for and logs data messages coming from the syslog client. Your organization is running security assessments, and you are on the blue team. What are your goals? Set goals, be neutral, and adjudicate Attack, defend, test, and improve Defend, alert, and respond Attack and evade You answered this question correctly.× Explanation: In teaming security assessments, the blue team is the defenders. It is their job to counter the red team and keep them from accomplishing their mission. This type of assessment has the advantage of measuring and improving alerting and response. Attack and evade is incorrect because this describes the red team, which acts as the adversary, attacking and trying to remain unnoticed. Set goals, be neural, and adjudicate is incorrect because this describes the white team, which is neutral. The members of the white team are the referees who define the goals and rules and adjudicate the exercise. Attack, defend test, and improve is incorrect because this describes the goals of the purple team, which effectively combines the skills and knowledge of the red and blue teams to achieve maximum effectiveness. In order to infiltrate a host system, an attacker uses nmap to view open ports. What type of reconnaissance is this? Passive OSINT Active Spear phishing You answered this question correctly.× Explanation: Active reconnaissance involves engaging the target to gather information. In this case, the attacker is engaging the target host with a port scan to view open ports. Passive is incorrect because passive reconnaissance is done without actually connecting to a target. Passive reconnaissance might involve gathering information from public sources regarding a target, for example. OSINT is incorrect. Open-source intelligence (OSINT) is the term for information available for collection from publicly available sources. Spear phishing is incorrect. Spear phishing is a social engineering attack commonly done through email that targets a specific person or group of individuals who work for the same company. As part of a bug bounty program, you will be running a zero-knowledge test, in which you have no understanding of the inner workings of the system. What type of environment testing will you be running? Partially known Known Unknown Footprinting You answered this question correctly.× Explanation: The participants of a bug bounty program have no understanding of the inner workings of the system, as the system is usually an unknown environment (black box). In an unknown environment test (black-box test), the assessor has no knowledge of the inner workings of the system or the source code. Known is incorrect because in a known environment, with white-box testing, also called clear-box or glass-box testing, the assessor has knowledge of the inner workings of either the system or the source code. Partially known is incorrect. A partially known (gray-box) environment combines known (white-box) and unknown (black-box) techniques. Think of this approach as translucent: The tester has some understanding or limited knowledge of the inner workings. Footprinting is incorrect. Footprinting is part of a reconnaissance process. It is used to gather as much information about a target as possible in order to penetrate it. Which of the following should Bernie be most concerned with, given that his company deals with intellectual property that is copyrighted? IP theft EOL Measurement systems analysis EOSL You answered this question correctly.× Explanation: Intellectual property (IP) theft is the stealing of intellectual property and/or copyrighted material. This material can be music, literary works, recipes, symbols, or anything else that is trademarked. Digital rights management (DRM) is used for the protection of copyrighted material. An early use of DRM technology was with CDs and DVDs. Measurement systems analysis is incorrect. Measurement systems analysis (MSA) is an experimental or mathematical assessment that attempts to find variation in measurement processes. EOL is incorrect because end of life (EOL) marks the end of a product’s life cycle, which began with the product first being generally available. While security patches may still be offered, the vendor does not provide for new features or continued compatibility. EOSL is incorrect because end of service life (EOSL) means that service and maintenance for the solution are no longer provided. For example, a software vendor may not sell or add features to a solution that has gone EOL but may still provide security updates and fix vulnerabilities up to the EOSL date.