Exam (elaborations)
COMPTIA SECURITY+ - CHAPTER 1 QUIZ -MASTERING SECURITY BASICS QUESTIONS AND ANSWERS
Course
TestOut Security Pro
Institution
TestOut Security Pro
COMPTIA SECURITY+ - CHAPTER 1 QUIZ -MASTERING SECURITY BASICS QUESTIONS AND ANSWERS
[Show more]
Preview 3 out of 18 pages
Uploaded on
August 16, 2024
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
TestOut Security Pro
Course
TestOut Security Pro
$12.99
Also available in package deal from $22.99
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
Also available in package deal (1)
1. Exam (elaborations) - Testout security pro // comptia security+ questions and answers
2. Exam (elaborations) - Comptia security+ - chapter 1 quiz -mastering security basics questions and answers
3. Exam (elaborations) - Comptia security+ - chapter 1 quiz -mastering security basics questions and answers
4. Exam (elaborations) - Comptia security+ - chapter 1 quiz -mastering security basics questions and answers
Show more
COMPTIA SECURITY+ SY0-601
PRACTICE QUESTIONS AND ANSWERS
ThesusersinstalledsTrojanshorsesmalware.s-sans--
Asusersusedsansadministratorsaccountstosdownloadsandsinstallsassoftwaresapplication.sAfters
thesuserslaunchedsthes.exesextensionsinstallersfile,sthesusersexperiencedsfrequentscrashes,s
slowscomputersperformance,sandsstrangesservicessrunningswhensturningsonsthescomputer.s
Whatsmostslikelyshappenedstoscausesthesesissues?
Asworms-sans--
Assecuritysoperationsscenters(SOC)sanalystsinvestigatessthespropagationsofsasmemory-
residentsvirussacrosssthesnetworksandsnoticessasrapidsconsumptionsofsnetworksbandwidth,s
causingsasDenialsofsServices(DoS).sWhatstypesofsvirussissthis?
PUPs(potentiallysunwantedsprogram)s-sans--
Asuserspurchasedsaslaptopsfromsaslocalscomputersshop.sAfterspoweringsonstheslaptopsforsth
esfirststime,sthesusersnoticedsasfewsprogramsslikesNortonsAntivirussaskingsforspermissionstosi
nstall.sHowswouldsansITssecuritysspecialistsclassifysthesesprograms?
-Usesslightweightsshellcode
-Usesslowsobservablescharacteristicsattackss-sans--
Asfilelesssmaliciousssoftwarescansreplicatesbetweensprocessessinsmemorysonsaslocalshostso
rsoversnetworksshares.sWhatsothersbehaviorssandstechniquesswouldsclassifysmalwaresassfil
elesssrathersthansasnormalsvirus?s(Selectsallsthatsapply.)
-ComputersBots,
-Commands&sControls-sans--
Ansattackersissplanningstossetsupsasbackdoorsthatswillsinfectsassetsofsspecificscomputerssatsa
nsorganization,stosinflictsassetsofsothersintrusionsattackssremotely.sWhichsofsthesfollowingswill
ssupportsthesattackers'splan?s(Selectsallsthatsapply.)
-LaunchsasDistributedsDenialsofsServices(DDoS)sattack
-EstablishsasconnectionswithsasCommandsandsControlsserver
-Launchsasmass-mailsspamsattacks-sans--
Ifsasuser'sscomputersbecomessinfectedswithsasbotnet,swhichsofsthesfollowingscansthisscompr
omisesallowsthesattackerstosdo?s(Selectsallsthatsapply.)
Havesup-to-datesbackups.s-sans--Ifsasuser'ssdevicesbecomessinfectedswithscrypto-
malware,swhichsofsthesfollowingsissthesbestswaystosmitigatesthisscompromise?
Aslogicsbombs-sans--
Assecuritysspecialistsdiscoverssasmalicioussscriptsonsascomputer.sThesscriptsisssetstosexecut
,esifsthesadministrator'ssaccountsbecomessdisabled.sWhatstypesofsmalwaresdidsthesspecialist
sdiscover?
Spywaresinfectedsthescomputers.s-sans--End-
userssatsansorganizationscontactsthescybersecuritysdepartment.sAftersdownloadingsasfile,sth
eysaresbeingsredirectedstosshoppingswebsitesstheysdidsnotsintendstosnavigatesto,sandsbuilt-
inswebcamssturnson.sThessecuritysteamsconfirmssthesissuesassmalicious,sandsnotessmodifie
dsDNSs(DomainsNamesSystem)squeriessthatsgostosnefariousswebsitesshostingsmalware.sW
hatsmostslikelyshappenedstosthesusers'scomputers?
AsRemotesAccesssTrojans(RAT)s-sans--
AnsattackersinstallssTrojansmalwaresthatscansexecutesremotesbackdoorscommands,ssuchsa
ssthesabilitystosuploadsfilessandsinstallssoftwarestosasvictimsPC.sWhatstypesofsTrojansmalware
sissthis?
Passwordssprayingsattacks-sans--
Ashackersisstryingstosgainsremotesaccessstosascompanyscomputersbystryingsbrutesforcespass
wordsattackssusingsasfewscommonspasswordssinsconjunctionswithsmultiplesusernames.sWh
atsspecificstypesofspasswordsattacksisstheshackersmostslikelysperforming?
-Asrainbowstable
-Asdictionaryswords-sans--
Ansattackerscansexploitsasweaknesssinsaspasswordsprotocolstoscalculatestheshashsofsaspass
word.sWhichsofsthesfollowingscansthesattackersmatchstheshashsto,sassasmeansstosobtainsthes
password?s(Selectsallsthatsapply.)
Asrainbowstablesattacks-sans--
Whichsofsthesfollowingsattackssdossecuritysprofessionalssexposesthemselvessto,sifstheysdosn
otssaltspasswordsswithsasrandomsvalue?
Clonesit.s-sans--
Howscansansattackersmakesunauthorizedsusesofsacquiredsusersandsaccountsdetailssfromsas
user'sssmartscard?
Skimmings-sans--Whatstypesofsattacksissoccurringswhensascounterfeitscardsreadersissinsuse?
Cross-sitesscriptings(XSS)s-sans--
Ansattackersdiscoveredsansinputsvalidationsvulnerabilitysonsaswebsite,scraftedsasURLswithsa
dditionalsHTMLscode,sandsemailedstheslinkstosasvictim.sThesvictimsunknowinglysdefaceds(va
ndalized)stheswebssitesaftersclickingsonsthesmalicioussURL.sNosothersmalicioussoperationsso
ccurredsoutsidesofstheswebsapplication'ssrootsdirectory.sThissscenariosissdescribingswhichsty
pesofsattack?
DLLsinjections-sans--
Ansattackersescalatedsprivilegesstosaslocalsadministratorsandsusedscodesrefactoringstosevad
esantivirussdetection.sThesattackersthensallowedsonesprocessstosattachstosanothersandsforce
, dsthesoperatingssystemstosloadsasmalicioussbinaryspackage.sWhatsdidsthesattackerssuccessf
ullysperform?
LDAPsinjections-sans--
Usingsansopensconnectionstosassmallscompany'ssnetwork,sansattackerssubmittedsarbitrarysq
ueriessonsports389stosthesdomainscontrollers.sThesattackersinitiatedsthesquerysfromsasclientsc
omputer.sWhatstypesofsinjectionsattacksdidsthesattackersperform?
Asmalicioussprocessscansaltersthesexecutionsenvironmentstoscreatesasnullspointer,sandscras
hsthesprogram.s-sans--
Howscanstheslacksofslogicsstatementstestssonsmemoryslocationsvariablessbesdetrimentalstoss
oftwaresinsdevelopment?
Asbuffersoverflows-sans--
Ansattackersgainedsremotesaccessstosasuser'sscomputersbysexploitingsasvulnerabilitysinsaspi
ecesofssoftwaresonsthesdevice.sThesattackerssentsdatasthatswassablestosmanipulatesthesme
moryssizesthatsthesapplicationsreservedstosstoresexpectedsdata.sWhichsvulnerabilitysexploits
resultedsfromsthesattacker'ssactions?
Racesconditions-sans--
Developerssfoundsas"timesofscheckstostimesofsuse"s(TOCTTOU)svulnerabilitysinstheirsapplica
tion.sThesvulnerabilitysmadesitspossiblestoschangestemporarysdatascreatedswithinsthesappsb
eforesthesappsusessthesdataslater.sThissvulnerabilitysisstakingsadvantagesofswhatsprocesssins
thesapplication?
Revealingsdatabasesserversconfigurations-sans--
Aswebsapplication'sscodespreventssthesoutputsofsanystypesofsinformationswhensanserrorsocc
urssduringsasrequest.sThesdevelopmentsteamscitedssecuritysreasonssasstoswhystheysdevelo
pedsthesapplicationsinsthissway.sWhatssortsofssecuritysissuessdidsthesteamshavesconcernssab
outsinsthisscase?
Replaysattacks-sans--
Ansintrudersmonitorssansadmin'ssunsecuresconnectionstosasserversandsfindsssomesrequireds
data,slikesascookiesfile,sthatslegitimatelysestablishessassessionswithsaswebsserver.sKnowingst
hesadmin'sslogonscredentials,swhatstypesofsattackscansthesintrudersperformswithsthescookiesf
ile?
Server-sidesrequestsforgerys-sans--
Ansattackerssubmittedsasmodifiedsuniformsresourceslocators(URL)slinkstosaswebsitesthatseve
ntuallysestablishedsconnectionsstosback-
endsdatabasessandsexposedsinternalsservicesconfigurations.sThesattackersdidsnotshijacksas
userstosperformsthissattack.sThissdescribesswhichsofsthesfollowingstypessofsattacks?
Cross-sitesRequestsForgerys(XSRF)s-sans--
AnsattackersmodifiedsthesHTMLscodesofsaslegitimatespassword-
changeswebsform,sthenshostedsthes.htmlsfilesonsthesattacker'sswebsserver.sThesattackersthe