Introduction to cybersecurity-definition, importance in digital era
Easy
A.The practice of designing new computer hardware.
B.The practice of protecting systems, networks, and programs from digital attacks.
C.The process of increasing a computer's processing speed.
D.The development of new mobile applications.
Correct Answer: The practice of protecting systems, networks, and programs from digital attacks.
Explanation:
Cybersecurity is the field dedicated to defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks, damage, or unauthorized access.
Incorrect! Try again.
2In the CIA Triad, which principle ensures that information is not disclosed to unauthorized individuals or systems?
CIA Triad (Confidentiality, Integrity, Availability)
Easy
A.Authenticity
B.Availability
C.Integrity
D.Confidentiality
Correct Answer: Confidentiality
Explanation:
Confidentiality is the principle that restricts access to information. It is equivalent to privacy and ensures that only authorized people can view sensitive data.
Incorrect! Try again.
3If a hacker successfully alters a record in a customer database, which principle of the CIA Triad has been violated?
CIA Triad (Confidentiality, Integrity, Availability)
Easy
A.Integrity
B.Availability
C.Authorization
D.Confidentiality
Correct Answer: Integrity
Explanation:
Integrity refers to the accuracy and trustworthiness of data. Unauthorized modification of data is a direct violation of data integrity.
Incorrect! Try again.
4A disgruntled employee who intentionally deletes company files is an example of what type of threat?
Cyber Threat Landscape: Insider vs External threats
Easy
A.External Threat
B.Insider Threat
C.Phishing Threat
D.Zero-Day Threat
Correct Answer: Insider Threat
Explanation:
An insider threat originates from within an organization, typically from an employee or contractor who has authorized access to systems and data.
Incorrect! Try again.
5What is the general term for any software intentionally designed to cause disruption to a computer, server, or computer network?
Malwares
Easy
A.Firmware
B.Adware
C.Shareware
D.Malware
Correct Answer: Malware
Explanation:
Malware, short for 'malicious software,' is the umbrella term that encompasses viruses, worms, trojans, ransomware, spyware, and other harmful software.
Incorrect! Try again.
6An email that appears to be from your bank asking for your password to 'verify your account' is a common example of which attack?
Common cyber-attacks- Phishing and Social Engineering attacks
Easy
A.Denial-of-Service attack
B.Phishing attack
C.Malware attack
D.Brute-force attack
Correct Answer: Phishing attack
Explanation:
Phishing is a type of social engineering attack that uses fraudulent emails, texts, or websites to trick individuals into revealing sensitive information like passwords and credit card numbers.
Incorrect! Try again.
7Which type of attack involves an attacker trying every possible combination of characters to guess a password?
Password and brute-force attacks
Easy
A.Social Engineering
B.Denial of Service
C.Brute-force attack
D.Phishing
Correct Answer: Brute-force attack
Explanation:
A brute-force attack is a trial-and-error method that uses automation to try all possible password combinations until the correct one is found.
Incorrect! Try again.
8What is the primary goal of a Denial of Service (DoS) attack?
Denial of Service (DoS)
Easy
A.To steal a user's password
B.To make a machine or network resource unavailable to its intended users
C.To gain administrative control over a system
D.To encrypt a user's files and demand a ransom
Correct Answer: To make a machine or network resource unavailable to its intended users
Explanation:
The main objective of a DoS attack is to overwhelm a target with traffic, rendering it unable to respond to legitimate requests, thus violating the 'Availability' principle of the CIA triad.
Incorrect! Try again.
9A 'zero-day' attack is an attack that exploits a vulnerability that is...
Zero day attack
Easy
A....only found in mobile operating systems.
B....only performed at midnight.
C....more than ten years old.
D....unknown to the software vendor or the public.
Correct Answer: ...unknown to the software vendor or the public.
Explanation:
It is called a 'zero-day' vulnerability because the software developer has had zero days to create a patch to fix the problem, making attacks highly effective until a fix is released.
Incorrect! Try again.
10Which of the following indicates a secure, encrypted connection to a website?
secure web browsing
Easy
A.The website loads very quickly
B.The website has a lot of images
C.The URL starts with http://
D.The URL starts with https://
Correct Answer: The URL starts with https://
Explanation:
HTTPS (Hypertext Transfer Protocol Secure) uses encryption to protect the data transmitted between your browser and the website, ensuring confidentiality and integrity.
Incorrect! Try again.
11Which security practice adds a second layer of protection to your accounts beyond just a password?
social media and email security
Easy
A.Writing your password on a sticky note
B.Disabling all security notifications
C.Two-Factor Authentication (2FA)
D.Using the same password everywhere
Correct Answer: Two-Factor Authentication (2FA)
Explanation:
2FA requires a second form of verification (like a code sent to your phone) in addition to your password, making it much harder for an attacker to gain unauthorized access.
Incorrect! Try again.
12What is a 'digital footprint'?
personal data protection and digital footprints
Easy
A.The brand of your computer monitor.
B.The trail of data you leave behind when you use the internet.
C.A type of computer virus.
D.The physical size of your hard drive.
Correct Answer: The trail of data you leave behind when you use the internet.
Explanation:
Your digital footprint is the collection of your online activities, including websites visited, emails sent, and information shared on social media.
Incorrect! Try again.
13What is the primary use of the cybersecurity tool Wireshark?
B.To discover hosts and services on a computer network
C.To edit text files
D.To create presentations
Correct Answer: To discover hosts and services on a computer network
Explanation:
Nmap (Network Mapper) is a powerful tool used for network discovery and security auditing. It scans networks to identify what hosts are available and what services they are offering.
Incorrect! Try again.
15What does 'cybersecurity compliance' refer to?
cybersecurity compliance
Easy
A.A competition between hackers.
B.Adhering to a set of laws and regulations designed to protect data.
C.A type of antivirus software.
D.The act of reporting a security breach.
Correct Answer: Adhering to a set of laws and regulations designed to protect data.
Explanation:
Compliance involves meeting the requirements of established standards, laws, and regulations, such as GDPR or HIPAA, to ensure data is protected according to legal mandates.
Incorrect! Try again.
16Which cybersecurity job role is focused on ethically hacking into systems to find and report vulnerabilities?
A Penetration Tester, or Ethical Hacker, is hired to simulate cyberattacks on an organization's systems to identify security weaknesses before malicious hackers can exploit them.
Incorrect! Try again.
17Ensuring that a website is online and accessible to authorized users when they need it relates to which principle of the CIA Triad?
CIA Triad (Confidentiality, Integrity, Availability)
Easy
A.Availability
B.Accountability
C.Integrity
D.Confidentiality
Correct Answer: Availability
Explanation:
Availability ensures that systems, networks, and data are operational and accessible to authorized users whenever they are needed. A website being down is a failure of availability.
Incorrect! Try again.
18What is the core principle behind social engineering attacks?
Common cyber-attacks- Phishing and Social Engineering attacks
Easy
A.Guessing weak passwords
B.Using overwhelming computer power
C.Exploiting hardware failures
D.Manipulating human psychology to trick people
Correct Answer: Manipulating human psychology to trick people
Explanation:
Social engineering attacks don't rely on technical exploits; instead, they prey on human trust, curiosity, and fear to manipulate victims into making security mistakes.
Incorrect! Try again.
19What type of malware encrypts a user's files and demands a payment to restore access?
Malware-based attacks
Easy
A.Virus
B.Spyware
C.Adware
D.Ransomware
Correct Answer: Ransomware
Explanation:
Ransomware is a malicious software that holds a victim's data hostage by encrypting it. The attackers then demand a ransom, usually in cryptocurrency, in exchange for the decryption key.
Incorrect! Try again.
20Which of the following is a good practice for protecting your personal data online?
personal data protection and digital footprints
Easy
A.Using the same simple password for all websites.
B.Regularly reviewing the privacy settings on your accounts.
C.Sharing your home address publicly on your profile.
D.Accepting all friend requests on social media.
Correct Answer: Regularly reviewing the privacy settings on your accounts.
Explanation:
Privacy settings allow you to control who can see your information and how it is used. Regularly reviewing and adjusting these settings is a fundamental step in protecting your personal data.
Incorrect! Try again.
21A ransomware attack encrypts a hospital's patient record system, preventing doctors from accessing critical patient data. Which component of the CIA triad is primarily compromised in this scenario?
CIA Triad (Confidentiality, Integrity, Availability)
Medium
A.Confidentiality
B.Authentication
C.Availability
D.Integrity
Correct Answer: Availability
Explanation:
The primary impact of the ransomware attack is that authorized users (doctors) cannot access the data when needed. This is a direct violation of Availability. While confidentiality and integrity might also be at risk, the immediate and intended impact described is the denial of access to the system.
Incorrect! Try again.
22A disgruntled system administrator uses their legitimate credentials to delete critical company databases a week after being fired. What type of threat does this action represent?
Cyber Threat Landscape: Insider vs External threats
Medium
A.A social engineering attack
B.A passive insider threat
C.A malicious insider threat
D.An external threat from a script kiddie
Correct Answer: A malicious insider threat
Explanation:
This is a classic example of a malicious insider threat. The individual was a former employee with legitimate access credentials and intentionally caused harm to the organization. A passive or unintentional insider threat would involve accidental data exposure, not deliberate sabotage.
Incorrect! Try again.
23An attacker sends a highly targeted email to a company's CFO, impersonating the CEO and urgently requesting a wire transfer to a new vendor. This email includes specific details about a recent company meeting. This is a prime example of:
Common cyber-attacks- Phishing and Social Engineering attacks
Medium
A.Vishing
B.Spear Phishing
C.Smishing
D.General Phishing
Correct Answer: Spear Phishing
Explanation:
Spear phishing is a more sophisticated form of phishing that targets a specific individual or organization. The use of specific, personalized information (like details from a meeting) to make the request seem legitimate is a key characteristic of spear phishing, distinguishing it from general, non-targeted phishing campaigns.
Incorrect! Try again.
24A user downloads a free photo editing application. The application works as advertised, but it also secretly installs a keylogger that captures the user's keystrokes and sends them to an attacker. What type of malware best describes this photo editing application?
Malwares
Medium
A.Spyware
B.Trojan Horse
C.Ransomware
D.Worm
Correct Answer: Trojan Horse
Explanation:
A Trojan Horse is a type of malware that disguises itself as a legitimate program. In this case, the photo editor is the seemingly legitimate application that carries a malicious payload (the keylogger). While the keylogger itself is a form of spyware, the delivery vehicle (the photo editor) is a Trojan.
Incorrect! Try again.
25An attacker has a list of the 10,000 most common passwords and is systematically trying them against a single user account. What specific type of password attack is this?
Password and brute-force attacks
Medium
A.Dictionary Attack
B.Rainbow Table Attack
C.Brute-Force Attack
D.Credential Stuffing
Correct Answer: Dictionary Attack
Explanation:
This is a dictionary attack, which is a subtype of a brute-force attack. A dictionary attack uses a predefined list of common words or passwords (a 'dictionary') rather than trying every possible combination of characters, which is a pure brute-force attack. Credential stuffing involves trying username/password pairs stolen from other breaches.
Incorrect! Try again.
26What is the primary difference between a Denial of Service (DoS) attack and a Distributed Denial of Service (DDoS) attack?
Denial of Service (DoS)
Medium
A.DoS attacks target network equipment, while DDoS attacks target servers.
B.DoS attacks originate from a single source, while DDoS attacks originate from multiple, distributed sources.
C.DoS attacks are always more powerful than DDoS attacks.
D.DoS attacks exploit software vulnerabilities, while DDoS attacks rely solely on overwhelming bandwidth.
Correct Answer: DoS attacks originate from a single source, while DDoS attacks originate from multiple, distributed sources.
Explanation:
The key differentiator is the number of sources. A DoS attack comes from one machine or IP address. A DDoS attack leverages a network of compromised devices (a botnet) to launch a coordinated attack from many different sources, making it much harder to block.
Incorrect! Try again.
27A cybercriminal discovers a previously unknown flaw in a popular web browser's code. They develop an exploit to steal user data and use it before the software vendor can release a patch. This situation describes a:
Zero day attack
Medium
A.Zero-day Attack
B.SQL Injection
C.Watering Hole Attack
D.Man-in-the-Middle Attack
Correct Answer: Zero-day Attack
Explanation:
A zero-day attack exploits a vulnerability that is unknown to the developers of the software. Because the vendor is unaware of the flaw, they have had 'zero days' to develop a patch, making these attacks particularly dangerous.
Incorrect! Try again.
28A network administrator notices unusual traffic patterns on the corporate network and wants to inspect the actual contents of the data packets being sent to and from a specific server. Which tool would be most suitable for this task?
Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems)
Medium
A.Nmap
B.Wireshark
C.Metasploit
D.John the Ripper
Correct Answer: Wireshark
Explanation:
Wireshark is a network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network. It is the ideal tool for deep packet inspection. Nmap is for network discovery and port scanning, Metasploit is for penetration testing, and John the Ripper is for password cracking.
Incorrect! Try again.
29When you visit a banking website, you see https in the URL and a padlock icon. What does the 'S' in https primarily provide?
secure web browsing
Medium
A.Anonymity for the user
B.Verification that the website has no malware
C.Encryption of the data exchanged between your browser and the server
D.Faster page loading speeds
Correct Answer: Encryption of the data exchanged between your browser and the server
Explanation:
HTTPS (Hypertext Transfer Protocol Secure) uses SSL/TLS to encrypt the communication channel between the client (your browser) and the server. This ensures the confidentiality and integrity of the data in transit, preventing eavesdroppers from reading sensitive information like passwords or financial details.
Incorrect! Try again.
30A user searches for a product on an e-commerce website. Later, they see advertisements for that same product on various other websites they visit. This is primarily a result of their:
personal data protection and digital footprints
Medium
A.Social media profile
B.Active digital footprint
C.Passive digital footprint
D.Encrypted email history
Correct Answer: Passive digital footprint
Explanation:
A passive digital footprint is a data trail you unintentionally leave online. In this case, tracking cookies are placed on the user's browser by the e-commerce site and advertising networks, which then track their activity across the web to serve targeted ads. The user did not actively share this information for advertising purposes.
Incorrect! Try again.
31A company that processes, stores, and transmits credit card information must adhere to a specific set of security standards to protect cardholder data. Which compliance framework is being referred to?
cybersecurity compliance
Medium
A.PCI-DSS (Payment Card Industry Data Security Standard)
B.SOX (Sarbanes-Oxley Act)
C.HIPAA (Health Insurance Portability and Accountability Act)
D.GDPR (General Data Protection Regulation)
Correct Answer: PCI-DSS (Payment Card Industry Data Security Standard)
Explanation:
PCI-DSS is the specific security standard that applies to all organizations that handle branded credit cards from the major card schemes. It is designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment.
Incorrect! Try again.
32A professional is hired to legally and ethically attempt to breach an organization's computer systems to find vulnerabilities before malicious hackers do. What is this job role commonly called?
A Penetration Tester, or Ethical Hacker, is a cybersecurity professional who performs authorized simulated attacks on computer systems to evaluate their security. Their goal is to identify and report vulnerabilities so they can be fixed.
Incorrect! Try again.
33An unauthorized person gains access to a database and alters a customer's shipping address. Which principle of the CIA triad has been violated?
CIA Triad (Confidentiality, Integrity, Availability)
Medium
A.Non-repudiation
B.Integrity
C.Availability only
D.Confidentiality only
Correct Answer: Integrity
Explanation:
Integrity ensures that data is accurate and has not been tampered with or altered by unauthorized parties. By changing the shipping address, the attacker has directly violated the integrity of the customer's data. Confidentiality was also violated by the unauthorized access, but the act of altering the data is a specific breach of integrity.
Incorrect! Try again.
34Your computer suddenly becomes extremely slow, and you notice a large amount of network traffic even when you're not actively using the internet. Later, you find out your computer was part of a coordinated attack on a major website. Your machine has likely been compromised by what?
Malware-based attacks
Medium
A.Adware
B.A Rootkit
C.A Logic Bomb
D.A Botnet
Correct Answer: A Botnet
Explanation:
A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam or participate in DDoS attacks. The symptoms described—unexplained network traffic and participation in a coordinated attack—are characteristic of a machine being part of a botnet.
Incorrect! Try again.
35A security system analyzes network traffic in real-time, learning the 'normal' behavior of the network. It then flags any activity that deviates significantly from this established baseline as a potential threat. This describes the functionality of a(n):
Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems)
Medium
A.AI-based threat detection system
B.Firewall with static rules
C.Port scanner like Nmap
D.Signature-based Intrusion Detection System (IDS)
Correct Answer: AI-based threat detection system
Explanation:
This is a key characteristic of modern, AI-based or anomaly-based threat detection systems. They use machine learning to establish a baseline of normal activity and then identify deviations, which allows them to detect novel or zero-day threats that a signature-based system (which looks for known patterns) would miss.
Incorrect! Try again.
36Which of the following is the most effective security practice for protecting your email account from unauthorized access, even if your password is stolen?
While all other options are good practices, 2FA is the most effective against password theft. With 2FA, an attacker who has your password would still need a second factor (like a code from your phone) to log in, providing a critical additional layer of security.
Incorrect! Try again.
37The 2017 Equifax data breach, which exposed the personal information of 147 million people, was primarily caused by the company's failure to:
case study of recent cyber incidents
Medium
A.Patch a known software vulnerability in their web application framework
B.Prevent a DDoS attack
C.Encrypt their entire database
D.Stop a malicious insider from stealing data
Correct Answer: Patch a known software vulnerability in their web application framework
Explanation:
The root cause of the Equifax breach was the failure to patch a critical vulnerability in the Apache Struts web framework. A patch was available for months, but Equifax did not apply it to their systems, allowing attackers to exploit the known flaw and gain access to sensitive data. This highlights the critical importance of timely patch management.
Incorrect! Try again.
38An attacker obtains a database of hashed passwords from a breached website. To crack them offline, they use a pre-computed table of hash values for millions of potential passwords. What attack method is being used?
Password and brute-force attacks
Medium
A.Credential Stuffing
B.Rainbow Table Attack
C.Dictionary Attack
D.Brute-Force Attack
Correct Answer: Rainbow Table Attack
Explanation:
A rainbow table attack uses a pre-computed table to reverse cryptographic hash functions, allowing an attacker to quickly look up the plain text password corresponding to a given hash. This is much faster than a brute-force or dictionary attack, which must compute the hash for each guess during the attack.
Incorrect! Try again.
39A smart thermostat in a home is compromised and used as a pivot point to attack other devices on the home network, like laptops and phones. This scenario best illustrates the cybersecurity challenge posed by what modern trend?
Introduction to cybersecurity-definition, importance in digital era
Medium
A.The adoption of cloud computing
B.The use of multi-factor authentication
C.The proliferation of the Internet of Things (IoT)
D.The rise of social media
Correct Answer: The proliferation of the Internet of Things (IoT)
Explanation:
The Internet of Things (IoT) refers to the vast network of physical devices (like smart thermostats, cameras, and appliances) that are connected to the internet. These devices often have weak security, making them prime targets for attackers who can use them to launch further attacks on more valuable targets within a network.
Incorrect! Try again.
40A user visits a popular news website, which has been compromised by an attacker. Malicious code on the news site silently redirects the user's browser to another site, which then attempts to install malware on their computer. This type of attack is known as a:
secure web browsing
Medium
A.Phishing Attack
B.Drive-by Download
C.Denial-of-Service (DoS) Attack
D.Cross-Site Scripting (XSS) Attack
Correct Answer: Drive-by Download
Explanation:
A drive-by download is an attack where malware is installed on a user's computer without their consent or knowledge, simply by visiting a compromised website. The user does not have to click on anything or explicitly approve a download for the attack to succeed. It exploits vulnerabilities in the browser or its plugins.
Incorrect! Try again.
41A real-time financial trading platform prioritizes sub-millisecond transaction speeds to maintain a competitive edge. To achieve this, it employs an aggressive distributed caching mechanism that updates every 500 milliseconds. While this significantly enhances performance and uptime (Availability), it creates a brief window where traders might see stale, yet validly formatted, market data. In this scenario, which security principle is being intentionally de-prioritized in a trade-off, and what is the specific risk?
CIA Triad (Confidentiality, Integrity, Availability)
Hard
A.Authenticity is de-prioritized, risking the execution of unauthorized trades.
B.Confidentiality is de-prioritized, risking the exposure of trading algorithms.
C.Integrity is de-prioritized, risking algorithmic trading decisions based on outdated information.
D.Availability is de-prioritized, risking system crashes due to cache coherency issues.
Correct Answer: Integrity is de-prioritized, risking algorithmic trading decisions based on outdated information.
Explanation:
The core trade-off is between Availability (high speed, constant uptime) and Integrity (the accuracy and correctness of data). By allowing a brief window for stale data, the system is accepting a minor, temporary loss of data integrity to ensure maximum performance. This is a common architectural decision in high-frequency systems. Confidentiality is not directly affected, and the trade-off actually improves availability. Authenticity relates to the identity of users, which is not the issue here.
Incorrect! Try again.
42A security analyst runs an Nmap scan on a web server and receives the following partial output:
PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.4.29 ((Ubuntu)) 2222/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 8080/tcp open http-proxy Apache Tomcat/Coyote JSP engine 1.1
The analyst knows that Apache Struts 2 is used by one of the applications running on Tomcat. Based only on the version information provided, which service represents the most probable critical and remotely exploitable vulnerability that should be prioritized for immediate investigation?
Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems)
Hard
A.The OpenSSH service on port 2222, because non-standard ports are often forgotten during patching cycles.
B.The Apache httpd service on port 80, as unencrypted traffic can be easily intercepted.
C.The Apache httpd service on port 443, as SSL implementations can have critical flaws like Heartbleed.
D.The Apache Tomcat service on port 8080, due to its common association with Java application vulnerabilities like those in older Struts versions.
Correct Answer: The Apache Tomcat service on port 8080, due to its common association with Java application vulnerabilities like those in older Struts versions.
Explanation:
This question requires synthesis of information. While all open ports are a concern, the key is the context provided: "Apache Struts 2 is used by one of the applications running on Tomcat." Historical vulnerabilities like CVE-2017-5638 (Equifax breach) in Apache Struts, which allow for Remote Code Execution (RCE), are extremely severe. The Nmap scan doesn't explicitly state a Struts vulnerability, but a security analyst must infer the highest risk based on the technology stack. The Apache and SSH versions listed are less likely to have trivial RCEs compared to an un-versioned application server known to host a framework with a history of critical vulnerabilities.
Incorrect! Try again.
43A highly secure government network, protected by a state-of-the-art next-generation firewall, an EDR solution, and a policy of patching all systems within 24 hours of vendor patch release, was breached. The forensic investigation revealed that the initial entry point was a spear-phishing email with a malicious PDF attachment. The victim opened the PDF with a fully patched version of Adobe Acrobat Reader, which executed shellcode to establish a C2 channel. What is the most accurate classification of the vulnerability that was exploited?
Zero day attack
Hard
A.A zero-day exploit.
B.A social engineering flaw in the user's judgment.
C.A known but unpatched vulnerability (N-day).
D.A configuration error in the EDR solution.
Correct Answer: A zero-day exploit.
Explanation:
The key elements are 'fully patched version' and 'patching all systems within 24 hours'. This implies that the vulnerability exploited by the malicious PDF was unknown to the vendor (Adobe) and the security community at the time of the attack. Therefore, no patch existed. This is the definition of a zero-day vulnerability. While social engineering was used for delivery, the technical mechanism of compromise was the exploit itself. A configuration error or N-day exploit is explicitly contradicted by the scenario's description of the target's security posture.
Incorrect! Try again.
44A US-based SaaS company provides a health and wellness application to customers globally, including in California and the European Union. The company collects personal identification, location data, and user-reported health metrics. In the event of a data breach affecting all users, which regulation imposes the most stringent (i.e., shortest) mandatory notification timeline to a supervisory authority, and what is that timeline?
Cybersecurity compliance
Hard
A.HIPAA (Health Insurance Portability and Accountability Act), requiring notification without unreasonable delay and in no case later than 60 calendar days following the discovery.
B.SOX (Sarbanes-Oxley Act), which does not specify a breach notification timeline but requires disclosure of material events.
C.CCPA (California Consumer Privacy Act), requiring notification in the most expedient time possible and without unreasonable delay.
D.GDPR (General Data Protection Regulation), requiring notification within 72 hours of becoming aware of the breach.
Correct Answer: GDPR (General Data Protection Regulation), requiring notification within 72 hours of becoming aware of the breach.
Explanation:
This question tests knowledge of the specifics and extraterritorial scope of major regulations. Because the company serves EU citizens, it is subject to GDPR regardless of its own location. GDPR's 72-hour notification requirement to the data protection authority is one of the strictest and most specific timelines in major privacy laws. HIPAA's 60-day limit and CCPA's 'unreasonable delay' clause are significantly less stringent.
Incorrect! Try again.
45A web application stores user password hashes using the bcrypt algorithm with a work factor of 12. An attacker manages to exfiltrate the entire password database, which includes the full hash strings (e.g., 12$...). The attacker possesses a massive pre-computed rainbow table for SHA-256 hashes of all 8-character passwords. How effective will this rainbow table be against the stolen bcrypt hashes?
Password and brute-force attacks
Hard
A.Highly effective, because the rainbow table can be adapted to reverse the bcrypt hashing process.
B.Completely ineffective, because bcrypt incorporates a unique salt for each password before hashing, making pre-computed tables for a different algorithm useless.
C.Somewhat effective, as it can identify the algorithm used and narrow down the search space for a subsequent brute-force attack.
D.Ineffective for most hashes, but effective for any passwords that were not salted by the bcrypt implementation.
Correct Answer: Completely ineffective, because bcrypt incorporates a unique salt for each password before hashing, making pre-computed tables for a different algorithm useless.
Explanation:
This question requires understanding the core differences between hashing algorithms. First, a rainbow table for SHA-256 is useless against bcrypt hashes as they are different algorithms. Second, and more importantly, bcrypt is a modern password hashing function that automatically generates and incorporates a random salt into each hash. This means that even if two users have the same password, their hashes will be different. Salting renders pre-computed tables (rainbow tables) useless because an attacker would need to generate a separate table for every possible salt value, which is computationally infeasible. The attacker's only option is a slow, offline brute-force or dictionary attack against each individual hash.
Incorrect! Try again.
46A web server suddenly becomes unresponsive to legitimate user requests. Network analysis shows that the server's TCP connection table is full. The connections are all in the SYN_RCVD state and originate from a wide range of spoofed IP addresses. The server's CPU and memory usage are nominal, but it cannot establish any new connections. Which specific type of DoS attack is this server experiencing?
Denial of Service (DoS)
Hard
A.A Ping of Death attack.
B.An HTTP GET Flood (Layer 7) attack.
C.A TCP SYN Flood attack.
D.A UDP Flood attack.
Correct Answer: A TCP SYN Flood attack.
Explanation:
The key symptoms described perfectly match a TCP SYN Flood. The attack exploits the TCP three-way handshake. The attacker sends a high volume of TCP SYN packets (the first step of the handshake) with spoofed source IPs. The server responds with a SYN-ACK and waits for the final ACK, moving the connection to the SYN_RCVD state. Since the source IPs are fake, the final ACK never arrives. This leaves a large number of half-open connections, exhausting the server's connection state table (backlog queue) and preventing it from accepting new, legitimate connections. Low CPU/memory usage is characteristic because the server isn't processing application-layer requests.
Incorrect! Try again.
47A company's SIEM system flags a data exfiltration event. Approximately 5 GB of sensitive R&D schematics were uploaded to a private cloud storage service. The activity is traced to the workstation of a senior engineer with legitimate access to the data. The logs show the activity occurred during normal business hours using the engineer's own credentials, with no evidence of remote access software or malware. The engineer denies any knowledge of the transfer. Which of the following threat scenarios is the most difficult to definitively prove or disprove with the given information?
Cyber Threat Landscape: Insider vs External threats
Hard
A.A malicious insider intentionally stealing data for personal gain or a competitor.
B.A sophisticated malware on the workstation that operates under the user's security context without their knowledge.
C.An external attacker who has compromised the engineer's credentials through phishing and is using a proxy within the company's geographical region to evade detection.
D.An unintentional data leak caused by a misconfigured backup script or synchronization tool run by the employee.
Correct Answer: An external attacker who has compromised the engineer's credentials through phishing and is using a proxy within the company's geographical region to evade detection.
Explanation:
This scenario is deliberately ambiguous. While a malicious insider is a strong possibility, it's hard to prove intent. An unintentional leak or a malware infection could potentially be identified through forensic analysis of the workstation. However, proving or disproving that a skilled external attacker is using stolen credentials from a non-suspicious IP address is extremely difficult. The attacker's actions would look identical to the legitimate user's actions in the network logs, making it a classic and challenging 'compromised insider' vs. 'malicious insider' investigation.
Incorrect! Try again.
48A malware variant infects a system and its primary payload is to modify the firmware of the system's hard drive controller. This modification persists even if the operating system is reinstalled or the drive is reformatted. The malware uses this persistent foothold to reinfect the operating system every time the machine boots. What is the most accurate classification for this type of malware?
Malwares
Hard
A.A Bootkit.
B.A Rootkit.
C.A Polymorphic Virus.
D.A Fileless Malware.
Correct Answer: A Bootkit.
Explanation:
This describes a bootkit, which is an advanced type of rootkit that infects the startup process of a computer. Specifically, by targeting firmware (like on a hard drive or UEFI/BIOS), it gains control before the operating system even begins to load. This makes it extremely difficult to detect and remove, as it can survive OS reinstallation and formatting. A standard rootkit operates within the OS, fileless malware resides in memory, and a polymorphic virus changes its own code to avoid signature detection, but none of these inherently involve firmware modification for persistence.
Incorrect! Try again.
49A security analyst is reviewing a Wireshark packet capture from a network segment and observes a pattern: A host (192.168.1.10) sends an ARP request asking "Who has 192.168.1.1?". The gateway (MAC AA:...) responds "192.168.1.1 is at AA:...". Immediately after, another host (192.168.1.50) sends an unsolicited ARP reply to 192.168.1.10, falsely claiming "192.168.1.1 is at BB:...". The analyst then sees all subsequent traffic from 192.168.1.10 intended for the gateway being sent to MAC address BB:.... What attack is being observed?
Cybersecurity tools (Nmap, Wireshark, AI-based threat detection systems)
Hard
A.DNS Spoofing.
B.MAC Flooding.
C.ARP Poisoning / ARP Spoofing.
D.IP Spoofing.
Correct Answer: ARP Poisoning / ARP Spoofing.
Explanation:
The scenario describes the exact mechanism of an ARP Poisoning attack, a common Man-in-the-Middle (MITM) technique. The Address Resolution Protocol (ARP) maps IP addresses to MAC addresses on a local network. The attacker (192.168.1.50) sends forged ARP messages to the victim (192.168.1.10) to associate the gateway's IP address with the attacker's own MAC address (BB:...). This tricks the victim into sending all its traffic through the attacker's machine, allowing the attacker to intercept or modify it.
Incorrect! Try again.
50An organization deploys an advanced AI-based User and Entity Behavior Analytics (UEBA) system. The system builds a baseline of normal activity for each user. An attacker with stolen credentials for a privileged account wants to find and exfiltrate sensitive data without being detected. Which of the following strategies would be most effective at evading this specific type of AI defense?
AI-based threat detection systems
Hard
A.Conducting a 'low-and-slow' attack, where actions are performed intermittently over a long period, closely mimicking the legitimate user's established access patterns and timings.
B.Using a zero-day exploit to disable the UEBA agent on the compromised machine.
C.Executing a 'smash-and-grab' attack, exfiltrating all data as quickly as possible before the system can respond.
D.Flooding the UEBA system with a large volume of fake log data to confuse its learning model.
Correct Answer: Conducting a 'low-and-slow' attack, where actions are performed intermittently over a long period, closely mimicking the legitimate user's established access patterns and timings.
Explanation:
UEBA systems excel at detecting deviations from an established baseline. A 'smash-and-grab' would create a massive, easily detectable anomaly. Disabling the agent or flooding logs are also noisy activities that would likely trigger alerts. The most sophisticated evasion technique is to operate 'below the radar'. By mimicking the legitimate user's behavior (e.g., accessing files they normally access, at times they normally work, from their usual location) and exfiltrating data in small chunks that look like normal network traffic, the attacker can avoid creating the statistical anomalies that the AI is designed to detect.
Incorrect! Try again.
51A user enables browser synchronization on their desktop and mobile devices. They log into their browser account, and all bookmarks, history, saved passwords, and extensions are synchronized across devices via the browser vendor's cloud. From a threat modeling perspective, what is the primary consequence of this feature regarding the user's digital footprint and attack surface?
Personal data protection and digital footprints
Hard
A.It reduces the attack surface by ensuring security settings and patches are consistent across all devices.
B.It anonymizes their digital footprint by mixing their browsing data with that of other users in the vendor's cloud.
C.It encrypts the digital footprint, making it more secure than if it were stored locally on an unencrypted hard drive.
D.It centralizes disparate parts of their digital footprint into a single, high-value target (the browser account), where a single credential compromise can expose their entire cross-device browsing life.
Correct Answer: It centralizes disparate parts of their digital footprint into a single, high-value target (the browser account), where a single credential compromise can expose their entire cross-device browsing life.
Explanation:
While browser sync offers convenience, its primary security implication is the creation of a single point of failure. It consolidates a vast amount of sensitive data (passwords, history, etc.) from multiple devices and protects it with a single set of credentials (the browser account password, possibly with 2FA). If an attacker compromises this one account, they gain access to the user's entire synchronized digital life, dramatically increasing the impact of a single breach. The other options are incorrect: while the data is encrypted in transit, it's accessible with the credentials; it doesn't necessarily ensure patch consistency; and it certainly does not anonymize the data.
Incorrect! Try again.
52An attacker crafts a spear-phishing email targeting a company's CEO. The email spoofs the identity of the company's legal counsel and urgently requests the CEO to wire funds for a confidential, time-sensitive corporate acquisition. The email stresses secrecy and warns against discussing the matter with anyone, including the CFO. This attack, known as Business Email Compromise (BEC), primarily leverages which two social engineering principles for maximum effect?
Phishing and Social Engineering attacks
Hard
A.Intimidation and Familiarity.
B.Authority and Scarcity/Urgency.
C.Social Proof and Liking.
D.Consistency and Reciprocity.
Correct Answer: Authority and Scarcity/Urgency.
Explanation:
This is a classic BEC scenario. The attacker leverages Authority by impersonating a high-ranking and trusted figure (the legal counsel), making the request seem legitimate and important. They create a powerful sense of Scarcity/Urgency by claiming the deal is 'time-sensitive' and 'confidential'. This combination is designed to make the target act quickly and bypass normal verification procedures, which is the primary goal of the attack. The other principles are less relevant in this specific context.
Incorrect! Try again.
53The 2020 SolarWinds (SUNBURST) attack was a landmark cybersecurity event. Instead of directly attacking target organizations, the threat actors compromised the software development process of a trusted vendor, SolarWinds. They inserted a malicious backdoor into the Orion Platform software, which was then digitally signed and distributed to thousands of customers via the legitimate update process. What is the most accurate term for this attack vector?
Case study of recent cyber incidents
Hard
A.A man-in-the-middle attack.
B.A watering hole attack.
C.A zero-day exploit.
D.A software supply chain attack.
Correct Answer: A software supply chain attack.
Explanation:
The SolarWinds incident is the archetypal example of a modern software supply chain attack. The attackers didn't target the end victims directly; they targeted a less-secure element 'upstream' in the supply chain—the vendor's build process. By compromising this single point, they were able to distribute their malware to a massive number of high-value targets who trusted the software and its updates. While a zero-day may have been used at some stage, the overall strategy and primary vector was the compromise of the supply chain.
Incorrect! Try again.
54A cybersecurity team is conducting a 'Purple Team' exercise. One group is responsible for emulating attacker Tactics, Techniques, and Procedures (TTPs) to exploit vulnerabilities and achieve specific objectives within the network. The other group is responsible for monitoring detection systems in real-time, analyzing the emulated attack's signatures, and tuning security controls (like EDR and SIEM rules) to improve detection and response for those specific TTPs. Which job roles best represent the attacking and defending groups, respectively?
Job roles and skill sets for cybersecurity
Hard
A.Penetration Testers (attackers) and Security Architects (defenders).
B.Ethical Hackers (attackers) and Compliance Auditors (defenders).
C.Threat Hunters (attackers) and Incident Responders (defenders).
D.Red Team (attackers) and Blue Team (defenders).
Correct Answer: Red Team (attackers) and Blue Team (defenders).
Explanation:
A 'Purple Team' exercise is a collaborative effort where the Red Team (offensive security, emulating attackers) and the Blue Team (defensive security, monitoring and responding) work together to improve overall security. The Red Team's actions test the Blue Team's detection and response capabilities in a controlled environment, allowing the Blue Team to immediately learn from the simulated attacks and enhance their defenses. This continuous feedback loop is the essence of a purple team engagement.
Incorrect! Try again.
55A system must defend against both online and offline password guessing attacks. Which of the following combinations of controls provides the strongest defense against both threat types?
Password and brute-force attacks
Hard
A.Server-side: Storing passwords in an encrypted database. Client-side: A strong password complexity policy (e.g., 12+ characters, mixed types).
B.Server-side: Hashing passwords with a global 'pepper' in addition to a salt. Client-side: CAPTCHA after failed login attempts.
C.Server-side: Use of a modern, slow hashing algorithm with a unique salt (e.g., Argon2). Client-side: Strict account lockout policies after a few failed attempts.
D.Server-side: Use of a fast hashing algorithm (e.g., SHA-256) for performance. Client-side: Multi-Factor Authentication (MFA).
Correct Answer: Server-side: Use of a modern, slow hashing algorithm with a unique salt (e.g., Argon2). Client-side: Strict account lockout policies after a few failed attempts.
Explanation:
This question requires analyzing defenses for two distinct scenarios. Offline attacks (when the hash database is stolen) are best mitigated by a slow, memory-hard hashing algorithm like Argon2 or bcrypt. This makes it computationally expensive for attackers to guess passwords even with the hashes. Online attacks (where attackers guess passwords against a live login form) are best mitigated by rate-limiting measures like account lockout policies, which prevent an attacker from making millions of guesses. The combination of Argon2 (for offline) and account lockout (for online) provides robust protection against both.
Incorrect! Try again.
56You are visiting a website using HTTPS, and your browser displays a padlock icon. You click the padlock and see the connection is encrypted with TLS 1.3, and the certificate was issued to 'example.com' by a trusted Certificate Authority (CA). Which of the following threats is not mitigated by these specific TLS/HTTPS protections?
Secure web browsing
Hard
A.An attacker using a packet sniffer to capture your session cookie on a public Wi-Fi network.
B.An attacker modifying the data (e.g., changing a transaction amount) while it is in transit between your browser and the server.
C.A man-in-the-middle attacker on your local network intercepting and reading the data you send to the server.
D.The website you are visiting is a phishing site perfectly mimicking the real 'example.com', but hosted on a different domain ('examp1e.com') that has its own valid TLS certificate.
Correct Answer: The website you are visiting is a phishing site perfectly mimicking the real 'example.com', but hosted on a different domain ('examp1e.com') that has its own valid TLS certificate.
Explanation:
HTTPS/TLS provides three main guarantees: Confidentiality (encryption prevents sniffing), Integrity (prevents in-transit modification), and Authentication (the certificate proves you are talking to the server named in the certificate). However, TLS authentication only proves you are securely connected to the domain in the certificate; it does not prove that the domain itself is trustworthy or legitimate. Attackers can easily obtain valid TLS certificates for malicious domains (like 'examp1e.com'). Therefore, while TLS prevents network-level MITM attacks, it does not, by itself, protect against sophisticated phishing attacks that use look-alike domains.
Incorrect! Try again.
57An attacker sends an email to a user with a link that appears legitimate. When the user clicks the link, they are taken to the real, legitimate website (e.g., their bank). However, the link was specially crafted to include a script that executes on the legitimate site, causing the user's browser to perform an unintended action, such as changing their password or transferring money. The user was already logged into their bank account in another tab. What is this attack called?
This scenario precisely describes a Cross-Site Request Forgery (CSRF) attack. The attack works by tricking a user's authenticated browser into sending a forged HTTP request to a trusted site where the user is already logged in. The malicious link or script from the attacker's site (e.g., the email) forges a request that the target site (the bank) trusts because it comes from the user's authenticated browser session. It is an attack on the site's trust in the user, not an injection of script into the site (which would be XSS).
Incorrect! Try again.
58A new strain of malware is discovered that does not write any executable files to the disk. Instead, its components are loaded directly from the network into the system's memory and executed using legitimate, built-in system tools like PowerShell and WMI (Windows Management Instrumentation). This technique makes it very difficult for traditional, signature-based antivirus solutions to detect. What is this category of malware known as?
Malware-based attacks
Hard
A.Polymorphic Malware.
B.Fileless Malware.
C.A Logic Bomb.
D.Metamorphic Malware.
Correct Answer: Fileless Malware.
Explanation:
This technique is the hallmark of fileless malware. It 'lives off the land' by using legitimate system tools (LOLBins - Living Off the Land Binaries) to carry out its malicious activities. By avoiding writing traditional executable files to the filesystem, it evades security products that primarily scan files for malicious signatures. Instead, detection requires more advanced techniques like behavioral analysis, memory forensics, and monitoring of command-line and script execution.
Incorrect! Try again.
59A company is undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit. The auditor finds that while the company encrypts all credit card numbers (PANs) in their database using AES-256, the encryption keys are stored in a configuration file on the same database server. Which specific security principle has been violated, and why does this fail compliance?
Cybersecurity compliance
Hard
A.Defense in depth. There is only a single layer of security (encryption) protecting the data.
B.The principle of data minimization. The company should not be storing credit card numbers at all.
C.Separation of duties and key management principles. Storing keys with the data they protect renders the encryption ineffective if the server is compromised.
D.The principle of least privilege. The database process has access to both data and keys.
Correct Answer: Separation of duties and key management principles. Storing keys with the data they protect renders the encryption ineffective if the server is compromised.
Explanation:
This is a critical failure of cryptographic security and a direct violation of PCI DSS requirements. Proper key management mandates that cryptographic keys be stored separately and securely from the data they encrypt. Storing the key on the same server as the encrypted data is like locking a door and leaving the key in the lock. If an attacker compromises the server, they get both the encrypted data (the 'safe') and the keys to decrypt it (the 'combination'), making the encryption completely useless. This violates the fundamental security principle of separating the protection mechanism (the key) from the asset (the data).
Incorrect! Try again.
60The concept of 'Cyber Resilience' extends beyond traditional cybersecurity. While traditional cybersecurity focuses primarily on preventing and detecting attacks, what is the core emphasis of cyber resilience that distinguishes it?
Introduction to cybersecurity-definition, importance in digital era
Hard
A.The ability of an organization to continue its mission-critical operations and recover quickly even when a cyber attack is successful.
B.The use of AI and machine learning to predict and preemptively block all future cyber attacks before they are launched.
C.The focus on achieving 100% compliance with all relevant cybersecurity regulations and standards.
D.The ability to create a perfectly impenetrable network perimeter that is immune to all forms of cyber attack.
Correct Answer: The ability of an organization to continue its mission-critical operations and recover quickly even when a cyber attack is successful.
Explanation:
Cyber resilience is a strategic shift from a prevention-centric mindset to one that assumes breaches will happen. Its primary focus is on business continuity and rapid recovery. It's about designing systems and processes that can withstand, adapt to, and quickly recover from cyber incidents, minimizing the impact on core business operations. The other options describe goals of traditional security (prevention, prediction) or compliance, but not the 'assume breach' and 'recoverability' focus that defines resilience.