1. An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware,the attacker is provided with access to the infected machine. Which of the following is being described?
A) Zero-day exploit
B) Remote code execution
C) Session hijacking
D) Command injection
2. An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again,adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?
A) Integer overflow attack
B) Smurf attack
C) Replay attack
D) Buffer overflow attack
E) Cross-site scripting attack
3. An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification,a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are. The controls used by the receptionist are in place to prevent which of the following types of attacks?
A) Tailgating
B) Shoulder surfing
C) Impersonation
D) Hoax
4. An attack that is using interference as its main attack to impede network traffic is which of the following?
A) Introducing too much data to a targets memory allocation
B) Utilizing a previously unknown security flaw against the target
C) Using a similar wireless configuration of a nearby network
D) Inundating a target system with SYN requests
5. An audit found that an organization needs to implement job rotation to be compliant with regulatory requirements. To prevent unauthorized access to systems after an individual changes roles or departments,which of the following should the organization implement?
A) Permission auditing and review
B) Exit interviews
C) Offboarding
D) Multifactor authentication
Write a public review