C. The correct answer is Spear phishing. Spear phishing is an
email or electronic communications scam targeted towards a
specific individual, organization or business. Although often
intended to steal data for malicious purposes, cybercriminals may
also intend to install malware on a targeted user’s computer.
D. The correct answer is Jamming. Jamming Attack is a kind of
Denial of Service attack, which prevents other nodes from using the
channel to communicate by occupying the channel that they are
communicating on.
A. The correct answer is Encrypting plain text using symmetric
encryption. A symmetric encryption is a type of encryption where
only one key (a secret key) is used to both encrypt and decrypt
electronic information. The entities communicating via symmetric
encryption must exchange the key so that it can be used in the
decryption process. This encryption method differs from asymmetric
encryption where a pair of keys, one public and one private, is used
to encrypt and decrypt messages.
A. Memory leak
B. Denial-of-service environment
C. Resources exhaustion
D. Application programming interface (API) attacks
B. The correct answer is Denial-of-service environment. This type of error impacts the availability of the service so the denial of
service condition is the correct answer which can stop the program
of running
B. The correct answer is SPIM. Just about all internet users have a
firsthand account of how annoying Spam is. If you use IM (Instant
Messaging) you just might have been SPIM’ed (Spam over Instant
Messaging). It may be more harmful than email Spam. The user is
more likely to click on the link because it is real-time. This sneaky
intrusion can be very annoying, and to make things worse, it by
basses the Anti-Virus and firewalls.
B. The correct answer is User behavior analysis. User behavior
analytics, sometimes called user entity behavior analytics (UEBA),
is a category of software that helps security teams identify and
respond to insider threats that might otherwise be overlooked.
Using machine learning and analytics, UBA identifies and follows
the behaviors of threat actors as they traverse enterprise
environments, running data through a series of algorithms to detect
actions that deviate from user norms.
D. The correct answer is Log collectors and Log aggregation. Log
aggregation is part of the overall log management process that
helps IT organizations convert their log files into actionable insights
in real-time or near real-time. The process can be described in five
basic steps:
Instrument & Collect - The first step of log management is to start
collecting logs. IT organizations must implement log collector
software tools that collect data from various parts of the software
stack. Many devices across platforms generate logs using the
Syslog message logging standard or with other applications that
can write logs directly into the log aggregation tool platform.
Centralize & Index - Log data needs to be normalized and
indexed, making it easier to analyze and fully searchable for
developers and security analysts.
Search & Analyze - Now that the log data is organized properly in
the log aggregation tool, it can be searched and analyzed to
discover patterns and identify any issues that require attention from
IT operators. Human or machine learning analysis can be used to
identify patterns and anomalies.
Monitor & Alert - Effective log monitoring is a critical aspect of the
log management process. An effective log management tool should
integrate with message applications to deliver timely alerts when
events occur that require a prompt response.
Report & Dashboard - The final component of log management,
reporting and dashboarding ensure that team members across
departments have the necessary levels of access and visibility into
application performance data.
C. The correct answer is Require authentication. One of the
methods that protect the API from attacks and ensures that API
calls are only used by legitimate users is to require the use of
authentication. API keys are one of the most frequently used
methods for this.
D. The correct answer is Scarcity. Social Engineers may use
scarcity to create a feeling of urgency in a decision making context.
This urgency can often lead to the manipulation of the decision
making process, allowing the social engineer to control the
information provided to the victim.
A. The correct answer is Utilize complex usernames/passwords. It’s
very important to use mix of special characters, numbers, upper &
lower case letters, non-words and require longer length. Don’t use
standard usernames such as administrator, user, user1, test,
admin, etc. Don’t use usernames that are first names only such as
dan, john, tom, etc.
Avoid creating passwords that include your name, dictionary words
or reusing passwords from other accounts. You may want to
increase the default minimum length beyond 6 characters. Using
simple passwords is the easiest way for someone to compromise
your server – do NOT use simple passwords that are vulnerable to
brute-force and dictionary attacks.
D. The correct answer is Typosquatting. Typosquatting is a type
of social engineering attack which targets internet users who
incorrectly type a URL into their web browser rather than using a
search engine. Typically, it involves tricking users into visiting
malicious websites with URLs that are common misspellings of
legitimate websites.
D. The correct answer is Domain hijacking. Domain hijacking is the
act of changing the registration of a domain name without the
permission of the original owner, or by abuse of privileges on
domain hosting and domain registrar systems.
Domain name hijacking is devastating to the original domain name
owner’s business with wide ranging effects including:
Financial damages: Companies who rely on their website for
business, such as ecommerce companies and SaaS companies,
can lose millions of dollars when they lose control of the domain,
their domain is one of their most valuable assets. Domain hijacking
is one of the largest cybersecurity risks online businesses have.
Reputational damages: Domain hijackers can take control of a
hijacked domain’s email accounts and use the domain name to
facilitate additional cyber attacks such as
installing malware or social engineering attacks.
Regulatory damages: By gaining access to a domain name,
hijackers can replace the real web page with an identical web page
designed to capture sensitive data or personally identifiable
information (PII), this is known as phishing.
D. The correct answer is Lack of vendor support. The question is
intended to assess the viability of the company in the long term,
and consequently if they will provide support, updates and fix
patches.
C. The correct answer is Removing all SQL code from Ajax
Requests. Server-side request forgery (also known as SSRF) is a
web security vulnerability that allows an attacker to induce the
server-side application to make HTTP requests to an arbitrary
domain of the attacker’s choosing.
In a typical SSRF attack, the attacker might cause the server to
make a connection to internal-only services within the
organization’s infrastructure. In other cases, they may be able to
force the server to connect to arbitrary external systems, potentially
leaking sensitive data such as authorization credentials.
Ways to prevent this are:
1. Use an alternative IP representation of 127.0.0.1
2. Register your own domain name that resolves to 127.0.0.1
3. Embed credentials in a URL before the hostname, using
the @ character
D. The correct answer is Automation of malware removal. SOAR
(Security Orchestration, Automation and Response) is a combination of compatible programs that enables a company to collect data on security threats from a wide variety of sources. In addition, SOAR enables an automatic reaction to certain security events without human intervention.
These are the three most important capabilities of SOAR solutions:
Threat and vulnerability management: The solutions support IT teams in eliminating vulnerabilities. In addition, they offer
standardized workflow, reporting and collaboration functions.
Reaction to security incidents: These technologies support IT
departments in planning, process organization, tracking and
coordinating the respective reaction to a security incident.
Automation of security operations: These technologies support the automation and orchestration of procedures, processes, policy
implementation and reporting.
A. The correct answer is IP & Domain reputation lookup. IPs use
sender reputation to decide whether (or not) they will deliver your
email messages to your subscribers. This sending reputation is
based on your IP address. But what if an ISP could make filtering
decisions based on your domain – rather than separate IPs? That is
the nature of domain reputation.
Domain reputation would essentially allow you to maintain your
reputation without worrying about individual IPs. That means you
could change IPs, send email from different providers and add new
IPs or use shared IPs without worrying about losing your good
reputation in the process and in connection with your brand.
A. The correct answer is Pivoting. Often during a penetration test or
security assessment, everything starts with an external network —
with research and pentesting of machines and services available
from the global network. Attempts are being made to find a security
hole and, if it succeeds, then a penetration into the local network is
performed in order to capture as many systems as possible.
Local network traffic is non-routable, that is, other computers that
are physically connected to this network can access the resources
of the local network, and the attacker cannot access them.
So, pivoting is a set of techniques that allow an attacker to gain
access to local resources, in essence, making traffic routable that is
normally non-routable. Pivoting helps an attacker to configure the
working environment to use the tools in such a way as if he were in
the organization’s local network.
A. The correct answer is Unknown environment test. In an unknown
environment or black-box testing assignment, the penetration tester
is placed in the role of the average hacker, with no internal
knowledge of the target system. Testers are not provided with any
architecture diagrams or source code that is not publicly available.
A black-box penetration test determines the vulnerabilities in a
system that are exploitable from outside the network.
B. The correct answer is Shimming. A shimming is a library that transparently intercepts API calls and changes the arguments passed, handles the operation itself or redirects the operation elsewhere. Shims can be used to support an old API in a newer environment, or a new API in an older environment. Shims can also be used for running programs on different software
platforms than they were developed for.
B. The correct answer is A plain-text password attack. Since you
capture the data you can conduct a plaintext attack. With a
known plaintext attack, the attacker has knowledge of the plaintext
and the corresponding ciphertext. This information is used to
decrypt the rest of the ciphertext.
D. The correct answer is Bluejacking. Bluejacking is a hacking
method that lets a person send unsolicited messages (typically
flirtatious but can also be malicious) to any Bluetooth-enabled
device within his own device’s range. Also known as “bluehacking,”
the process begins by scanning one’s surroundings for
discoverable Bluetooth-capable devices.
Bluejacking is much like doorbell ditching, wherein a person rings
someone’s doorbell and disappears before the homeowner can
answer the door.
A. The correct answer is Initialization vector. An initialization vector (IV) attack is an attack on wireless networks. It modifies the IV of an
encrypted wireless packet during transmission. IVs are blocks of
bits that are used to differentiate users on the wireless network. IVs
eliminate the need for users to constantly reauthenticate with an
access point and are therefore sent frequently.
A,D. The correct answers are Reverse Engineering and Man-in-theMiddle Attack. RFID systems, like most electronics and networks, are susceptible to both physical and electronic attacks. As the technology matures and becomes more widespread, so do hackers who aim to gain private information, entrance to secure areas, or take a system down for personal gain. Below are 7 known security attacks hackers can perform on an RFID system.
1. Reverse Engineering
2. Power Analysis
3. Eavesdropping & Replay
4. Man-in-the-Middle Attack or Sniffing
5. Denial of Service
6. Cloning & Spoofing
7. Viruses