CompTIA Sec+ SY0-701: Domain 2, Quiz 2
These flashcards highlight common cybersecurity vulnerabilities and attack types, including XSS, sideloading, DDoS, and password spraying, to help identify threats and understand attacker methods.
Which of the following is a vulnerability related to web-based applications where malicious scripts are injected into trusted websites?
a. Malicious update
b. Virtual machine (VM) escape
c. Cross-site scripting (XSS)
d. Firmware vulnerability
Cross-site scripting (XSS)
XSS is a web-based vulnerability where malicious scripts are injected into trusted websites and executed in a user’s browser.
Key Terms
Which of the following is a vulnerability related to web-based applications where malicious scripts are injected into trusted websites?
a. Malicious update
b. Virtual machine (VM) escape
c. Cross-site scripting (XSS)
d. Firmware vulnerability
Cross-site scripting (XSS)
XSS is a web-based vulnerability where malicious scripts are injected into trusted websit...
A mobile device vulnerability allowing unofficial apps to be installed outside the official app store is known as?
a. Firmware vulnerability
b. VM escape
c. Sideloading
d. Jailbreaking
Sideloading
Sideloading is the process of installing apps on a mobile device without using the official app store.
A company discovered that an attacker used multiple compromised systems to flood their website’s server with traffic. This is an example of:
a. Virus attack
b. Logic bomb
c. Distributed denial-of-service (DDoS) attack
d. Trojan attack
Distributed denial-of-service (DDoS) attack
A DDoS attack uses multiple compromised systems to flood a target system...
Which of the following indicates a password attack where multiple password attempts are made using various usernames?
a. Brute force
b. Collision
c. Spraying
d. Buffer overflow
Spraying
Spraying attacks try a few commonly used passwords against many usernames to avoid account lockouts.
Indicators of malicious activity might include all of the following EXCEPT:
a. Blocked content
b. Patching frequency
c. Concurrent session usage
d. Impossible travel
Patching frequency
Patching frequency is a maintenance task, not necessarily an indicator of malicious activity.
To prevent unauthorized devices from accessing certain parts of the network, an administrator should implement:
a. Patching
b. Monitoring
c. Segmentation
d. Decommissioning
Segmentation
Segmentation divides a network into different segments, often using firewalls, to control access and im...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Which of the following is a vulnerability related to web-based applications where malicious scripts are injected into trusted websites? a. Malicious update | Cross-site scripting (XSS) XSS is a web-based vulnerability where malicious scripts are injected into trusted websites and executed in a user’s browser. |
A mobile device vulnerability allowing unofficial apps to be installed outside the official app store is known as? a. Firmware vulnerability | Sideloading Sideloading is the process of installing apps on a mobile device without using the official app store. |
A company discovered that an attacker used multiple compromised systems to flood their website’s server with traffic. This is an example of: a. Virus attack | Distributed denial-of-service (DDoS) attack A DDoS attack uses multiple compromised systems to flood a target system with traffic, causing service interruptions. |
Which of the following indicates a password attack where multiple password attempts are made using various usernames? a. Brute force | Spraying Spraying attacks try a few commonly used passwords against many usernames to avoid account lockouts. |
Indicators of malicious activity might include all of the following EXCEPT: a. Blocked content | Patching frequency Patching frequency is a maintenance task, not necessarily an indicator of malicious activity. |
To prevent unauthorized devices from accessing certain parts of the network, an administrator should implement: a. Patching | Segmentation Segmentation divides a network into different segments, often using firewalls, to control access and improve security. |
Which mitigation technique specifically involves creating a list of approved software that is allowed to run on a system? a. Configuration enforcement | Application allow list An application allow list involves creating a list of approved software permitted to run on a system. |
After obtaining a new router, a network administrator should ensure that ____ to enhance its security. a.All unnecessary software is installed | The default password is changed Changing the default password is crucial because attackers often know manufacturers’ default credentials. |
Malware that hides its presence by taking control of OS processes at a deep level is known as: a. Spyware | Rootkit Rootkits take control at the OS level, often hiding their existence and activities. |
Which of the following describes a vulnerability in an application where two processes access a shared resource concurrently, resulting in undesirable outcomes? a. Race conditions | Race conditions Race conditions occur when two processes access a shared resource concurrently, leading to unpredictable outcomes. |
A newly discovered vulnerability that does not yet have a patch available is known as a: a. Zero-day | Zero-day Zero-day vulnerabilities are newly discovered vulnerabilities that do not yet have a patch available. |
If an attacker tries to create a cryptographic hash collision, they are attempting to: a. Exploit a vulnerability in a cipher’s key generation | Find two different inputs that produce the same hash output A collision attack attempts to find two distinct data sets that produce the same hash. |
Which mitigation technique involves ensuring that a user or process can only access resources essential for their legitimate purposes? a. Segmentation | Least privilege The principle of least privilege ensures users or processes have only the permissions they need to perform their tasks. |
Which of the following is an attack where the attacker tries to determine or guess the password of a system by trying all possible combinations? a. Collision | Brute force A brute force attack involves trying all possible combinations to guess a password. |
To ensure that only specific IP addresses can access a certain network resource, an administrator should implement: a. Hardening techniques | Access control list (ACL) An ACL specifies which users or IP addresses can access resources. |