D. The correct answer is Cross-site Request Forgery. Cross-site
request forgery, also known as one-click attack or session riding
and abbreviated as CSRF or XSRF, is a type of malicious exploit of
a website where unauthorized commands are submitted from a
user that the web application trusts.
B. The correct answer is Denial-Of-Service. A Denial-of-Service
(DoS) attack is an attack meant to shut down a machine or
network, making it inaccessible to its intended users. DoS attacks
accomplish this by flooding the target with traffic, or sending it
information that triggers a crash. If an attacker can make the web
application generate a memory leak, the application will eventually
consume all memory on the web server and the web server will
crash.
D. The correct answer is Tailgating. A tailgating attack, also referred
to as “piggybacking,” involves attackers seeking entry to a
restricted area without proper authentication. In it, the perpetrators
can simply follow an authorized person into a restricted location.
They can impersonate delivery men carrying tons of packages,
waiting for an employee to open the door. They can ask the
unknowing target to hold the door, bypassing security measures
like electronic access control.
A. The correct answer is Shoulder surfing. Shoulder surfing is the
practice of spying on the user of a cash-dispensing machine or
other electronic devices in order to obtain their personal
identification number, password, etc.
B. The correct answer is Known environment. Known environment
or White Box Testing is software testing technique in which internal
structure, design and coding of software are tested to verify flow of
input-output and to improve design, usability and security. In white
box testing, code is visible to testers so it is also called Clear box
testing. In a known environment, the tester is given extensive
knowledge of the target network.
A. The correct answer is Urgency and authority. The attacker presented the case as needing quick intervention (urgency) and
presented himself as a technical security personnel (authority)
A. The correct answer is Man in the browser. The Man-in-theBrowser attack is the same approach as Man-in-the-middle attack,
but in this case is used to intercept and manipulate calls between
the main application’s executable (ex: the browser) and its security
mechanisms or libraries on-the-fly. The most common objective of
this attack is to cause financial fraud by manipulating transactions
of Internet Banking systems, even when other authentication
factors are in use.
B. The correct answer is Malicious USB cable. A malicious USB
cable is a type of cable that can receive commands from a nearby
smartphone and then execute them over the PC it’s been plugged
into.
A. The correct answer is On-path attack. On-path attackers place
themselves between two devices (often a web browser and a web
server) and intercept or modify communications between the two.
The attackers can then collect information as well as impersonate
either of the two agents
B. The correct answer is Vishing. Vishing is the fraudulent practice
of making phone calls or leaving voice messages purporting to be
from reputable companies in order to induce individuals to reveal
personal information, such as bank details and credit card
numbers.
D. The correct answer is Firmware patch management. Patching
provides a mechanism to regularly update features and protect
software with current enhancements and bug fixes, and software
updates for consumer-grade wireless routers are normally executed
as firmware updates.
B. The correct answer is Memory leak causes crashes. Memory
leaks result in crashes and this in turn culminates in an outage.
D. The correct answer is Skimming. Skimming is an illegal practice
used by identity thieves to capture credit card information from a
cardholder surreptitiously. Fraudsters often use a device called a skimmer that can be installed at gas pumps or ATM machines to
collect card data. Some machines act like point-of-sale technology.
A. The correct answer is Passive reconnaissance is an attempt to
gain information about computers without actively engaging with
the systems while active reconnaissance is an attempt to gain
information about computers typically by conducting a port scan to
find any open ports.
C. The correct answer is LDAP query parameterization. The LDAP
parameters dialog specifies an LDAP search operation to locate
directory entries and optionally return attributes from those entries.
All the other options are used.
B. The correct answer is Dark web. The dark web is the hidden
collective of internet sites only accessible by a specialized web
browser. It is used for keeping internet activity anonymous and
private, which can be helpful in both legal and illegal applications.
B. The correct answer is An on-path attack. SSL stripping attack is
a kind of on-path attack where an attacker intervenes in the
redirection of the HTTP to the secure HTTPS protocol and
intercepts a request from the user to the server. The attacker will
then continue to establish an HTTPS connection between himself
and the server, and an unsecured HTTP connection with the user,
acting as a “bridge” between them.
D. The correct answer is A threat map. A cyber threat map, also
known as a cyber attack map, is a real-time map of the computer
security attacks that are going on at any given time.
A. The correct answer is Bluesnarfing. Bluesnarfing is the theft of information through Bluetooth. Hackers do it by sneaking into mobile devices—smartphones, laptops, tablets, or personal digital
assistants (PDAs) whose connection has been left open by their owners. It implies exploiting Bluetooth vulnerabilities in order to grab such data as text or email messages, contact lists, and more.
B. The correct answer is Maneuver. In CompTIA terms, “maneuver”
is often used in threat hunting as: how to think like a malicious user
to help you identify potential indicators of compromise in your
environment