



















































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive set of multiple choice questions and answers covering various aspects of cybersecurity. the questions delve into key concepts such as command injection, file inclusion attacks, cross-site scripting, sql injection, session guessing, clickjacking, and cross-site request forgery. it also explores vulnerabilities in ftp services, integer overflow, and format string vulnerabilities, along with social engineering tactics like phishing and pretexting. The detailed answers offer valuable insights for students learning about cybersecurity threats and mitigation strategies.
Typology: Exams
1 / 59
This page cannot be seen from the preview
Don't miss anything!
What is a command injection? ANS:-- A flaw in a web application that takes advantage in how a web application process user input What is the best way to mitigate a Command Injection? ANS:-- To program the web application without a third party entity and to sanitize the user input What is a file inclusion attack? ANS:-- A result of adding resources on a page based on user input What is the best way to mitigate a file inclusion attack? ANS:-- The best way to avoid being vulnerable to this attack is to avoid dynamically adding files based on user input What is a Cross Site Scripting Attack? ANS:-- A client side attack that targets users that are browsing the site. Typically occurs in areas of the site where users input information How do you mitigate a Cross Site Scripting Attack? ANS:-- To sanitize the user input and to use a 3rd party library and not implement your own filter
What is an SQL injection attack? ANS:-- A type of injection attack wherein the attacker exploits the web application to send unauthorized commands to a backend database server How do you mitigate SQL ANS:-- It is to not user an insecure method of passing queries to the database What is a Session Guessing attack? ANS:-- Where an attacker guesses a Session Token and logs into a site under your information What is the best way to mitigate a Session Guessing attack? ANS:-- To use truly random session tokens that expire What is a click jacking attack? ANS: -- Where a user can be tricked into clicking on something without realizing that they did How do you mitigate a clickjacking attack? ANS:-- Make sure that the web server itself sends the X-Frame Options header in the HTTP response What are the three values within a X-Frame Options header in an HTTPS
What is the Directory Traversal vulnerability used for? ANS:-- To read sensitive data within the web application What is the best way to mitigate directory traversal attack? ANS:-- It is to not use user input when making file system calls What is a File Upload Vulnerability? ANS:-- A flaw where the user can upload an arbitrary file to the server and then visit it to execute code What is used to test web applications? A) NMAP B) A scanner C) A Vulnerability Scanner D) Nothing ANS:-- A Vulnerability Scanner When would you go public with a vulnerability found within a business website? A) After a patch was released B) Before the patch is released, after you have discussed it with the business C) Before you tell the business and you go public immediately D) Never and use it for your own exploits ANS:-- After the patch was released
What is Integer Overflow? ANS:-- Program assumes that a value is always positive, overflow makes signed integer wrap and become negative What is the return pointer? A) Where the CPU returns to after completing a function B) Where the CPU goes to next after completing a function C) Where the CPU goes to after all functions are completed D) Where the pointer is ANS:-- Where the CPU goes to next after completing a function What is a stack canary? ANS:-- It is a value that sits before the return pointer of the stack. What is Address Space Layout Randomization? ANS:-- A protection that involves randomizing the Memory address that a program gets loaded into each run What is a Format String Vulnerability? ANS:-- It occurs when you run printf in C without a format string How do you mitigate a Format String Vulnerability? ANS:-- Never use printf without a format string
from developers What is Social Engineering? A) Where engineering is done publicly B) Where you trick someone into doing something for you that goes against company policy C) Where it is engineering that you can watch D) A Livestream of engineering ANS:-- Where you trick someone into doing something for you that goes against company policy What is Pretexting? A) The metadata that is created before the text is sent B) Where you pretend to be someone else over email or phone C) None of the above D) Where you are the person you are trying to pretend to be over the phone or email ANS:-- Where you pretend to be someone else over email or phone What is Phishing? A) An email that encourages people to click on malicious links or download malicious files
B) Where you send out emails to attackers in hopes one clicks on it to report to local police C) A great outdoor sport D) None of the above ANS:-- An email that encourages people to click on malicious links or download malicious files What is Spear Phishing? A) A phishing attack but you have a specific target in mind for the attack B) Where you go phishing but with a spear instead of a normal bait and hook C) Where you target a specific attacker with an email or file in hopes they tag it D) None of the above ANS:-- A phishing attack but you have a specific target in mind for the attack Where do phishing attacks normally strike the most? ANS:-- A legal dept, HR, and the accounting dept What is a word Marco? ANS:-- A word doc that can host malware What is a Drive By Download attack?
What is Privilege Escalation? A) Where you gain the highest level of access within a system B) Where you gain a higher privilege in life C) Where you escalate privilege of a user to meet their needs for work D) None of the above ANS:-- Where you gain the highest level of access within a system What are some of the ways to perform privilege escalation? A) Exploiting Services B) Exploiting the Kernel C) SUID Files D) All of the above ANS:-- All of the above What is a Wild Card injection? A) Where you take advantage of a code but supplementing Wildcards within code B) Where you use wild cards to help run the command in question C) Where you use a parameter to run code in a command prompt D) None of the above ANS:-- Where you take advantage of a code but supplementing wildcards within the code
What is the difference between "sudo" and "su"?
Which packet type is used when a graceful TCP Teardown fails? A) FIN B) RST C)EXI T D) ACK/FIN ANS:-- RST Which of the following is a likely source of logs for HTTP network traffic data? A) Layer 2 switch B)Firewall C) DNS Server D) Active Directory Server ANS:-- Firewall Which of the following is a Windows Database of settings for both the operating system and applications? A) Group Policy B) User Access Control C) PowerShell
D) Registry ANS:-- Registry A Red Team would use the following command for which purposes?
A) Identifying open ports that could be used to compromise a host B) Determining updates needed for the host's asset inventory record C) Identifying unauthorized open ports to disable on the host D) Determining version information for services running on the host ANS:-- Identifying open ports that could be used to compromise a host What is the software or firmware platform that hosts a virtual machine called? A) Guest System B) Hypervisor C) Container D) Operating System ANS:-- Hypervisor Which of the following Linux permissions would allow the owner of a file to read, write, and execute a file while allowing everyone else to read and execute? A) 755
A) Setting ownership of /var/www to the www-data user and www-data group B) Setting file permissions to 644 on the website C) Setting directory permissions to 755 on the web site D) Adding www-data user to the server's administrator group ANS:-- Adding www- data user to the server's administrator group What file attribute is the penetration tester looking to find using the command below?
find / - per - 2000 - user root - type f - print 2>/dev/null A) SGID set B) SUID set C) Sticky bit set D) World writable ANS:-- SGID set What protocol is this computer set to use to obtain an IP Address? A) ICMP B)RDP C)DNS D)IPSec E) DHCP ANS:-- DHCP How does the default setting for User Account Control improve Windows Security? A) Notifies users of software installation B) Notifies users of changes to system settings C) Approves security significant system changes D) Denies software installation ANS:-- Notifies users of software installation
What are they trying to access? A) A remote Registry Key B) A website uniform resource locator C) A local drive mapping D) A hidden share on a remote host ANS:-- A hidden share on a remote host What does it mean when a computer program is "multi-threaded"? A) It calls multiple external libraries B) It has multiple serial number for different users C) It can run multiple chunks of code concurrently D) It has multiple functions defined in the program ANS:-- It can run multiple chunks of code concurrently Which of the following is a common result of a reflected cross-site scripting attack? A) Tricking a user into making an authenticated transaction B) Sending a website user's session cookie to an attacker C) Embedding the attacker's malware in web application source code D) Stealing password hashes from a website's back end database ANS:-- Sending a website user's session cookie to an attacker
What tool can be used to fingerprint the operating system of a host? A) netstat B)dig C)nslooku p D)nmap ANS:-- Nmap What type of vulnerability is illustrated where there is code in the web page? A) File Inclusion B) Clickjacking C)Cross-Site Scripting D) SQL injection ANS:-- File Inclusion An alert indicates that a compromised host was used by an attacker to run the command below. What was the attacker attempting to do? $ nmap - sS 192.168.10.0/ A) Map a network drive to a remote host