1. An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:
A) Passive reconnaissance B) Persistence C) Escalation of privileges D) Exploiting the switch
2. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol. Which of the following configurations should the instructor implement?
A) WPA2 B) WPA C) EAP D) WEP
3. Ann,a college professor,was recently reprimanded for posting disparaging remarks re-grading her coworkers on a web site. Ann stated that she was not aware that the public was able to view her remakes. Which of the following security-related trainings could have made Ann aware of the repercussions of her actions?
A) Data Labeling and disposal B) Use of social networking C) Use of P2P networking D) Role-based training
4. Ann,a customer,is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?
A) Ransomware B) Keylogger C) Buffer overflow D) Rootkit
5. Ann. An employee in the payroll department,has contacted the help desk citing multiple issues with her device,including: Slow performance Word documents,PDFs,and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice,she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
A) Spyware B) Crypto-malware C) Rootkit D) Backdoor
Leave a comment