ログイン

11 ) EX. 10 | COMPLETE
84問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    What sanitization technique uses only logical techniques to remove data, such as overwriting a hard drive with a random series of ones and zeroes?

    - Clear

  • 2

    This data is meant to eliminate information from being feasibly recovered even in a laboratory environment.

    - Purge

  • 3

    This requires physical destruction of the media, such as pulverization, melting, incineration, and disintegration.

    - Destroy

  • 4

    This is the process of decreasing or eliminating a remnant magnetic field. This is an effective method of sanitization for magnetic media, such as hard drives and floppy disks.

    - Degauss

  • 5

    When using tcpdump, which option or flag would you use to record the ethernet frames during a packet capture?

    -e

  • 6

    This option will capture the packet's payload in hex and ASCII formats

    -X

  • 7

    This shows I.P addresses and ports in numeric format.

    -nn

  • 8

    This flag will show the I.P. addresses in numeric form.

    -n

  • 9

    During the Stuxnet attack, a sophisticated worm was delivered to the victim, Iran's nuclear facilities, via an infected USB stick. Which phase of the Cyber Kill Chain does this represent?

    - Delivery

  • 10

    What is about maintaining communication with the compromised system, not delivering a payload.

    - Command and Control

  • 11

    This is the phase where the payload establishes a foothold on the system.

    - Installation

  • 12

    This is about gathering information about the target system, not delivering a payload.

    - Reconnaissance

  • 13

    Which of the following frameworks is best suited for performing a structured approach to security testing across different areas such as applications, networks, and systems?

    - Open Source Security Testing Methodology Manual (OSS TMM)

  • 14

    This primarily focuses on understanding the relationship between four elements of an attack: the adversary, the victim, the infrastructure, and the capability. It's not geared towards security testing.

    - Diamond Model of Intrusion Analysis

  • 15

    This framework provides a matrix of tactics, techniques, and procedures ( T.T.Ps ) used by cyber adversaries. It doesn't focus on providing a structured approach to security testing.

    - MITRE ATT&CK

  • 16

    This Guide provides a methodology for testing the security of web applications specifically, not a comprehensive approach to security testing across different areas.

    - OWASP Testing Guide

  • 17

    What regulation protects the privacy of student educational records?

    - FERPA

  • 18

    This institutes requirements that help protect the privacy of an individual's financial information held by financial institutions and others, such as tax preparation companies. The privacy standards and rules created as part of GLBA safeguard private information and set penalties in the event of a violation.

    - GLBA

  • 19

    This dictates requirements for storing and retaining documents relating to an organization's financial and business operations, including the type of documents to be stored and their retention periods. It is relevant for any publicly-traded company with a market value of at least $75 million.

    - SOX

  • 20

    This establishes several rules and regulations regarding healthcare in the United States. With the rise of electronic medical records, HIPAA standards have been implemented to protect patient medical information privacy through restricted access to medical records and regulations for sharing medical records.

    - HIPAA

  • 21

    What describes the infrastructure needed to support the other architectural domains in the T.O.G.A.F. framework?

    - Technical architecture

  • 22

    This provides the organization’s approach to storing and managing information assets. This question may seem beyond the scope of the exam.

    - Data architecture

  • 23

    This defines governance and organization and explains the interaction between enterprise architecture and business strategy.

    - Business architecture

  • 24

    This includes the applications and systems an organization deploys, the interactions between those systems, and their relation to the business processes.

    - Applications architecture

  • 25

    This references ( I.D.O.R. ) are a cybersecurity issue that occurs when a web application developer uses an identifier for direct access to an internal implementation object but provides no additional access control and/or authorization checks.

    - Insecure direct object reference

  • 26

    These are commonly a result of incomplete or ad-hoc configurations, open cloud storage, misconfigured H.T.T.P. headers, unnecessary H.T.T.P. methods, permissive Cross-Origin resource sharing ( C.O.R.S ), and verbose error messages containing sensitive information.

    - Weak or default configurations

  • 27

    This can reveal implementation details that should never be revealed, such as detailed information that can provide hackers important clues on the system's potential flaws.

    - Improper error handling

  • 28

    This is a software vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events.

    - Race condition

  • 29

    Which of the following scan types are useful for probing firewall rules?

    - TCP ACK

  • 30

    This scan can sometimes be used to determine what ports are filtered. Still, if the firewall is configured to drop packets for disallowed ports instead of sending an R.S.T packet, then a T.C.P S.Y.N. scan will not be able to determine if a firewall was there or if the port was simply unavailable. A target sends a T.C.P R.S.T packet in response to a T.C.P. ACK scan, but a T.C.P. R.S.T. is not a valid type of scan itself.

    - TCP SYN

  • 31

    A target sends a this packet in response to a T.C.P ACK scan, but a T.C.P R.S.T. is not a valid type of scan itself.

    - TCP RST

  • 32

    This scan will set the FIN, PSH, and U.R.G flags in the T.C.P. packet. This is a noisy type of scan and not useful for probing firewall rules.

    - XMAS TREE

  • 33

    Referencing the infamous WannaCry ransomware attack, where the attackers exploited a vulnerability in Microsoft’s SMB protocol using an NSA tool known as EternalBlue, which phase of the Cyber Kill Chain involves the creation and preparation of this exploit for use in the attack?

    - Weaponization

  • 34

    This phase would be when the attackers actually encrypted the files and demanded the ransom.

    - Actions and Objectives

  • 35

    This phase involves the transmission of the malicious payload to the victim, not the creation of it.

    - Delivery

  • 36

    This refers to the phase where the attacker establishes a channel to control the compromised system.

    - Command and Control

  • 37

    After a major ransomware attack on your organization, a comprehensive review process is initiated. This review involves dissecting the incident to identify what went wrong, what went well, and what steps can be taken to prevent such an event from happening again in the future. What is the term used for this critical part of the post-incident phase?

    - Lessons learned

  • 38

    This is a detailed investigation of an incident to understand its origin, extent, and impact. While it can inform lessons learned, it does not itself represent the comprehensive review process aimed at improving future responses.

    - Forensic analysis

  • 39

    This analysis seeks to identify the origin of an incident, but does not involve a broad review of the incident response process with the aim of improving future responses.

    - Root cause analysis

  • 40

    These exercises are a part of the preparation phase of the incident management lifecycle and are used to test the effectiveness of an organization's incident response plan. They do not involve reviewing past incidents to improve future responses.

    - Tabletop exercise

  • 41

    A penetration tester has been hired to conduct an assessment, but the company wants to exclude social engineering from the list of authorized activities. Which of the following documents would include this limitation?

    - Rules of engagement

  • 42

    This is a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

    - Memorandum of understanding

  • 43

    This policy is a policy that governs employees' use of company equipment and internet services.

    - Acceptable use policy

  • 44

    This contains the operating procedures and standards for a service contract.

    - Service Level Agreement ( S.L.A. )

  • 45

    Which of the following protocols could be used inside a virtual system to manage and monitor the network?

    - SNMP

  • 46

    Is used for email.

    - SMTP

  • 47

    are used for routing network data. ( bravo )

    - BGP

  • 48

    are used for routing network data. ( echo )

    - EIGRP

  • 49

    If an attacker can compromise an Active Directory domain by utilizing an attack to grant administrative access to the domain controllers for all domain members, which type of attack is being used?

    - Golden ticket

  • 50

    This is an umbrella term for a variety of attack types. Attackers can extend their lateral movement by a great deal if they can compromise host credentials

    - Lateral movement

  • 51

    This is the process of harvesting an account's cached credentials when the user logs in to a single sign-on ( S.S.O. ) system. This would then allow the attacker to use the credentials on other systems, as well.

    - Pass the hash

  • 52

    This is a process similar to lateral movement. When attackers pivot, they compromise one central host (the pivot) that allows them to spread out to other hosts that would otherwise be inaccessible.

    - Pivoting

  • 53

    Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

    - TACACS+

  • 54

    This is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

    - RADIUS

  • 55

    This is used to authenticate a user or network host to an authenticating entity. This is an authentication protocol but does not provide authorization or accounting services.

    - CHAP

  • 56

    This is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by M.I.T.

    - Kerberos

  • 57

    Which of the following automatically combines multiple disparate sources of information to form a complete picture of events for analysts to use during an incident response or when conducting proactive threat hunting?

    - Data enrichment

  • 58

    This is a software development method in which code updates are tested and committed to development or build server/code repositories rapidly, and is unrelated to this question.

    - Continuous integration

  • 59

    These are forms of artificial intelligence that may be used to conduct data enrichment activities, but individually they are not sufficient to answer this question. ( Mike )

    - Machine learning

  • 60

    These are forms of artificial intelligence that may be used to conduct data enrichment activities, but individually they are not sufficient to answer this question. ( delta )

    - Deep learning

  • 61

    You are conducting a quick nmap scan of a target network. You want to conduct an SYN scan, but you don't have raw socket privileges on your workstation. Which of the following commands should you use to conduct the SYN scan from your workstation?

    - nmap -sT

  • 62

    This flag would conduct a Xmas scan where the FIN, PSH, and URG flags are used in the scan.

    - nmap -sX

  • 63

    This flag would conduct an operating system detection scan of the target system.

    - nmap -O

  • 64

    This flag is more often conducted, but it requires raw socket access on the scanning workstation.

    - nmap -sS

  • 65

    In the Mirai botnet attack, thousands of IoT devices, such as cameras and routers, were infected and used to launch large-scale DDoS attacks. In the Diamond Model of Intrusion Analysis, what do these IoT devices represent?

    - Infrastructure

  • 66

    This refers to the tools and techniques used in the attack, not the resources used in the attack.

    - Capability

  • 67

    This is the target of the attack, not the resources used in the attack.

    - Victim

  • 68

    This is the entity conducting the attack, not the resources used in the attack.

    - Adversary

  • 69

    A vulnerability scanner has reported that a vulnerability exists in the system. Upon validating the report, the analyst determines that this reported vulnerability does not exist on the system. What is the proper term for this situation?

    - False positive

  • 70

    This occurs when a scanner does not detect a vulnerability, but the vulnerability actually exists on the scanned system.

    - False negative

  • 71

    This occurs when a scanner detects a vulnerability, and the vulnerability exists on the scanned system.

    - True positive

  • 72

    This occurs when a scanner does not detect a vulnerability because the vulnerability does not exist on the scanned system.

    - True negative

  • 73

    Which protective feature is used to prevent a buffer overflow attack from specific applications by randomizing where a program's components are run from in memory?

    - ASLR

  • 74

    This feature protects processes against exploits that try to execute code from a writable memory area (stack/heap). This also prevents code from being run from a non-executable memory region

    - DEP

  • 75

    This is a library that contains code and data that can be used by more than one program at the same time.

    - DLL

  • 76

    This is a comprehensive set of strategies, technologies, and processes designed to prevent sensitive data from being lost, misused, or accessed by unauthorized individuals.

    - DLP

  • 77

    Which phase of the Cyber Kill Chain involves the attacker maintaining communication with the compromised system to facilitate data exfiltration or further exploitation?

    - Command and Control

  • 78

    This involves transmitting the weaponized payload to the victim, not maintaining communication with the compromised system.

    - Delivery

  • 79

    This involves taking advantage of a vulnerability in the system or application to execute the payload, not maintaining communication with the compromised system.

    - Exploitation

  • 80

    This involves creating a malicious payload, not maintaining communication with the compromised system.

    - Weaponization

  • 81

    Which of the following tools is useful for capturing Windows memory data for forensic analysis?

    - Memdump

  • 82

    This tool is used to conduct forensic disk images.

    - dd

  • 83

    This is used for packet capture and analysis.

    - Wireshark

  • 84

    This is a commonly used vulnerability scanner.

    - Nessus

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    What sanitization technique uses only logical techniques to remove data, such as overwriting a hard drive with a random series of ones and zeroes?

    - Clear

  • 2

    This data is meant to eliminate information from being feasibly recovered even in a laboratory environment.

    - Purge

  • 3

    This requires physical destruction of the media, such as pulverization, melting, incineration, and disintegration.

    - Destroy

  • 4

    This is the process of decreasing or eliminating a remnant magnetic field. This is an effective method of sanitization for magnetic media, such as hard drives and floppy disks.

    - Degauss

  • 5

    When using tcpdump, which option or flag would you use to record the ethernet frames during a packet capture?

    -e

  • 6

    This option will capture the packet's payload in hex and ASCII formats

    -X

  • 7

    This shows I.P addresses and ports in numeric format.

    -nn

  • 8

    This flag will show the I.P. addresses in numeric form.

    -n

  • 9

    During the Stuxnet attack, a sophisticated worm was delivered to the victim, Iran's nuclear facilities, via an infected USB stick. Which phase of the Cyber Kill Chain does this represent?

    - Delivery

  • 10

    What is about maintaining communication with the compromised system, not delivering a payload.

    - Command and Control

  • 11

    This is the phase where the payload establishes a foothold on the system.

    - Installation

  • 12

    This is about gathering information about the target system, not delivering a payload.

    - Reconnaissance

  • 13

    Which of the following frameworks is best suited for performing a structured approach to security testing across different areas such as applications, networks, and systems?

    - Open Source Security Testing Methodology Manual (OSS TMM)

  • 14

    This primarily focuses on understanding the relationship between four elements of an attack: the adversary, the victim, the infrastructure, and the capability. It's not geared towards security testing.

    - Diamond Model of Intrusion Analysis

  • 15

    This framework provides a matrix of tactics, techniques, and procedures ( T.T.Ps ) used by cyber adversaries. It doesn't focus on providing a structured approach to security testing.

    - MITRE ATT&CK

  • 16

    This Guide provides a methodology for testing the security of web applications specifically, not a comprehensive approach to security testing across different areas.

    - OWASP Testing Guide

  • 17

    What regulation protects the privacy of student educational records?

    - FERPA

  • 18

    This institutes requirements that help protect the privacy of an individual's financial information held by financial institutions and others, such as tax preparation companies. The privacy standards and rules created as part of GLBA safeguard private information and set penalties in the event of a violation.

    - GLBA

  • 19

    This dictates requirements for storing and retaining documents relating to an organization's financial and business operations, including the type of documents to be stored and their retention periods. It is relevant for any publicly-traded company with a market value of at least $75 million.

    - SOX

  • 20

    This establishes several rules and regulations regarding healthcare in the United States. With the rise of electronic medical records, HIPAA standards have been implemented to protect patient medical information privacy through restricted access to medical records and regulations for sharing medical records.

    - HIPAA

  • 21

    What describes the infrastructure needed to support the other architectural domains in the T.O.G.A.F. framework?

    - Technical architecture

  • 22

    This provides the organization’s approach to storing and managing information assets. This question may seem beyond the scope of the exam.

    - Data architecture

  • 23

    This defines governance and organization and explains the interaction between enterprise architecture and business strategy.

    - Business architecture

  • 24

    This includes the applications and systems an organization deploys, the interactions between those systems, and their relation to the business processes.

    - Applications architecture

  • 25

    This references ( I.D.O.R. ) are a cybersecurity issue that occurs when a web application developer uses an identifier for direct access to an internal implementation object but provides no additional access control and/or authorization checks.

    - Insecure direct object reference

  • 26

    These are commonly a result of incomplete or ad-hoc configurations, open cloud storage, misconfigured H.T.T.P. headers, unnecessary H.T.T.P. methods, permissive Cross-Origin resource sharing ( C.O.R.S ), and verbose error messages containing sensitive information.

    - Weak or default configurations

  • 27

    This can reveal implementation details that should never be revealed, such as detailed information that can provide hackers important clues on the system's potential flaws.

    - Improper error handling

  • 28

    This is a software vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events.

    - Race condition

  • 29

    Which of the following scan types are useful for probing firewall rules?

    - TCP ACK

  • 30

    This scan can sometimes be used to determine what ports are filtered. Still, if the firewall is configured to drop packets for disallowed ports instead of sending an R.S.T packet, then a T.C.P S.Y.N. scan will not be able to determine if a firewall was there or if the port was simply unavailable. A target sends a T.C.P R.S.T packet in response to a T.C.P. ACK scan, but a T.C.P. R.S.T. is not a valid type of scan itself.

    - TCP SYN

  • 31

    A target sends a this packet in response to a T.C.P ACK scan, but a T.C.P R.S.T. is not a valid type of scan itself.

    - TCP RST

  • 32

    This scan will set the FIN, PSH, and U.R.G flags in the T.C.P. packet. This is a noisy type of scan and not useful for probing firewall rules.

    - XMAS TREE

  • 33

    Referencing the infamous WannaCry ransomware attack, where the attackers exploited a vulnerability in Microsoft’s SMB protocol using an NSA tool known as EternalBlue, which phase of the Cyber Kill Chain involves the creation and preparation of this exploit for use in the attack?

    - Weaponization

  • 34

    This phase would be when the attackers actually encrypted the files and demanded the ransom.

    - Actions and Objectives

  • 35

    This phase involves the transmission of the malicious payload to the victim, not the creation of it.

    - Delivery

  • 36

    This refers to the phase where the attacker establishes a channel to control the compromised system.

    - Command and Control

  • 37

    After a major ransomware attack on your organization, a comprehensive review process is initiated. This review involves dissecting the incident to identify what went wrong, what went well, and what steps can be taken to prevent such an event from happening again in the future. What is the term used for this critical part of the post-incident phase?

    - Lessons learned

  • 38

    This is a detailed investigation of an incident to understand its origin, extent, and impact. While it can inform lessons learned, it does not itself represent the comprehensive review process aimed at improving future responses.

    - Forensic analysis

  • 39

    This analysis seeks to identify the origin of an incident, but does not involve a broad review of the incident response process with the aim of improving future responses.

    - Root cause analysis

  • 40

    These exercises are a part of the preparation phase of the incident management lifecycle and are used to test the effectiveness of an organization's incident response plan. They do not involve reviewing past incidents to improve future responses.

    - Tabletop exercise

  • 41

    A penetration tester has been hired to conduct an assessment, but the company wants to exclude social engineering from the list of authorized activities. Which of the following documents would include this limitation?

    - Rules of engagement

  • 42

    This is a preliminary or exploratory agreement to express an intent to work together that is not legally binding and does not involve monetary exchange.

    - Memorandum of understanding

  • 43

    This policy is a policy that governs employees' use of company equipment and internet services.

    - Acceptable use policy

  • 44

    This contains the operating procedures and standards for a service contract.

    - Service Level Agreement ( S.L.A. )

  • 45

    Which of the following protocols could be used inside a virtual system to manage and monitor the network?

    - SNMP

  • 46

    Is used for email.

    - SMTP

  • 47

    are used for routing network data. ( bravo )

    - BGP

  • 48

    are used for routing network data. ( echo )

    - EIGRP

  • 49

    If an attacker can compromise an Active Directory domain by utilizing an attack to grant administrative access to the domain controllers for all domain members, which type of attack is being used?

    - Golden ticket

  • 50

    This is an umbrella term for a variety of attack types. Attackers can extend their lateral movement by a great deal if they can compromise host credentials

    - Lateral movement

  • 51

    This is the process of harvesting an account's cached credentials when the user logs in to a single sign-on ( S.S.O. ) system. This would then allow the attacker to use the credentials on other systems, as well.

    - Pass the hash

  • 52

    This is a process similar to lateral movement. When attackers pivot, they compromise one central host (the pivot) that allows them to spread out to other hosts that would otherwise be inaccessible.

    - Pivoting

  • 53

    Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

    - TACACS+

  • 54

    This is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

    - RADIUS

  • 55

    This is used to authenticate a user or network host to an authenticating entity. This is an authentication protocol but does not provide authorization or accounting services.

    - CHAP

  • 56

    This is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by M.I.T.

    - Kerberos

  • 57

    Which of the following automatically combines multiple disparate sources of information to form a complete picture of events for analysts to use during an incident response or when conducting proactive threat hunting?

    - Data enrichment

  • 58

    This is a software development method in which code updates are tested and committed to development or build server/code repositories rapidly, and is unrelated to this question.

    - Continuous integration

  • 59

    These are forms of artificial intelligence that may be used to conduct data enrichment activities, but individually they are not sufficient to answer this question. ( Mike )

    - Machine learning

  • 60

    These are forms of artificial intelligence that may be used to conduct data enrichment activities, but individually they are not sufficient to answer this question. ( delta )

    - Deep learning

  • 61

    You are conducting a quick nmap scan of a target network. You want to conduct an SYN scan, but you don't have raw socket privileges on your workstation. Which of the following commands should you use to conduct the SYN scan from your workstation?

    - nmap -sT

  • 62

    This flag would conduct a Xmas scan where the FIN, PSH, and URG flags are used in the scan.

    - nmap -sX

  • 63

    This flag would conduct an operating system detection scan of the target system.

    - nmap -O

  • 64

    This flag is more often conducted, but it requires raw socket access on the scanning workstation.

    - nmap -sS

  • 65

    In the Mirai botnet attack, thousands of IoT devices, such as cameras and routers, were infected and used to launch large-scale DDoS attacks. In the Diamond Model of Intrusion Analysis, what do these IoT devices represent?

    - Infrastructure

  • 66

    This refers to the tools and techniques used in the attack, not the resources used in the attack.

    - Capability

  • 67

    This is the target of the attack, not the resources used in the attack.

    - Victim

  • 68

    This is the entity conducting the attack, not the resources used in the attack.

    - Adversary

  • 69

    A vulnerability scanner has reported that a vulnerability exists in the system. Upon validating the report, the analyst determines that this reported vulnerability does not exist on the system. What is the proper term for this situation?

    - False positive

  • 70

    This occurs when a scanner does not detect a vulnerability, but the vulnerability actually exists on the scanned system.

    - False negative

  • 71

    This occurs when a scanner detects a vulnerability, and the vulnerability exists on the scanned system.

    - True positive

  • 72

    This occurs when a scanner does not detect a vulnerability because the vulnerability does not exist on the scanned system.

    - True negative

  • 73

    Which protective feature is used to prevent a buffer overflow attack from specific applications by randomizing where a program's components are run from in memory?

    - ASLR

  • 74

    This feature protects processes against exploits that try to execute code from a writable memory area (stack/heap). This also prevents code from being run from a non-executable memory region

    - DEP

  • 75

    This is a library that contains code and data that can be used by more than one program at the same time.

    - DLL

  • 76

    This is a comprehensive set of strategies, technologies, and processes designed to prevent sensitive data from being lost, misused, or accessed by unauthorized individuals.

    - DLP

  • 77

    Which phase of the Cyber Kill Chain involves the attacker maintaining communication with the compromised system to facilitate data exfiltration or further exploitation?

    - Command and Control

  • 78

    This involves transmitting the weaponized payload to the victim, not maintaining communication with the compromised system.

    - Delivery

  • 79

    This involves taking advantage of a vulnerability in the system or application to execute the payload, not maintaining communication with the compromised system.

    - Exploitation

  • 80

    This involves creating a malicious payload, not maintaining communication with the compromised system.

    - Weaponization

  • 81

    Which of the following tools is useful for capturing Windows memory data for forensic analysis?

    - Memdump

  • 82

    This tool is used to conduct forensic disk images.

    - dd

  • 83

    This is used for packet capture and analysis.

    - Wireshark

  • 84

    This is a commonly used vulnerability scanner.

    - Nessus