Introduction to Cybersecurity Module 2: Attacks, Concepts and Techniques Quiz Exam Answers Full 100% 2023 2024

This is Module 2: Attacks, Concepts and Techniques Quiz Exam Answers Full 100% for Cisco SkillsForAll in 2023 and 2024. All answers have been verified by experts with a simple explanation.

  1. Which of the following examples illustrates how malware might be concealed?

    • A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site
    • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
    • A botnet of zombies carry personal information back to the hacker
    • An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors

      Answers Explanation & Hints:

      The second example illustrates how malware might be concealed. In this example, the malware is disguised as an antivirus update, which may appear legitimate to the employee receiving the email. Once the employee downloads the attachment, the malware (spyware) can then infect the system and carry out its malicious activities without the user being aware. This is an example of social engineering, where attackers use psychological manipulation to trick users into performing actions that are not in their best interest.

  2. What is the purpose of a rootkit?

    • To masquerade as a legitimate program
    • To replicate itself independently of any other programs
    • To deliver advertisements without user consent
    • To gain privileged access to a device while concealing itself

      Answers Explanation & Hints:

      The purpose of a rootkit is to gain privileged access to a device while concealing itself. A rootkit is a type of malware that is designed to hide its presence on a computer or other device while providing an attacker with privileged access to that device. Rootkits are often used to gain access to sensitive information or to carry out other malicious activities on the compromised device, such as stealing passwords, monitoring user activity, or carrying out further attacks. Rootkits are difficult to detect and remove, making them a potent tool for cyber criminals.

  3. What is the primary goal of a DoS attack?

    • To scan the data on the target server
    • To obtain all addresses in the address book within the server
    • To facilitate access to external networks
    • To prevent the target server from being able to handle additional requests

      Answers Explanation & Hints:

      The primary goal of a DoS (Denial of Service) attack is to prevent the target server from being able to handle additional requests, making the server unavailable to legitimate users.

  4. What is the most common goal of search engine optimization (SEO) poisoning?

    • To build a botnet of zombies
    • To trick someone into installing malware or divulging personal information
    • To increase web traffic to malicious sites
    • To overwhelm a network device with maliciously formed packets

      Answers Explanation & Hints:

      The most common goal of search engine optimization (SEO) poisoning is to increase web traffic to malicious sites. This is achieved by manipulating search engine results to display links to malicious websites at the top of the search results, which can lure unsuspecting users into clicking on these links and visiting the sites. Once users visit the malicious sites, they may be subjected to various forms of attack, such as phishing attacks, malware downloads, or attempts to steal personal information.

  5. A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?

    • A hack
    • A fix
    • An install
    • A patch

      Answers Explanation & Hints:

      A patch is a set of changes made to a program or application, usually to fix bugs or vulnerabilities, update features, or improve performance. It is typically distributed as a small file that contains only the changes necessary to update an existing program, rather than a full installation package. Patches are commonly used to address security vulnerabilities or other issues that can be exploited by attackers. Installing patches is an important part of maintaining the security and reliability of software and systems.

  6. Which of the following should be carried out to address known software vulnerabilities of a specific application?

    • Install a security patch
    • Remove the application
    • Change the hardware
    • Change the software

      Answers Explanation & Hints:

      To address known software vulnerabilities of a specific application, you should install a security patch. Security patches are updates that are released by software vendors to address vulnerabilities and improve the security of their software. By installing the security patch, you can ensure that your application is protected against known vulnerabilities. Removing the application or changing the hardware or software may not be necessary or practical solutions.

  7. Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?

    • Buffer overflow
    • Access control problem
    • Race condition
    • Non-validated input

      Answers Explanation & Hints:

      A non-validated input vulnerability occurs when a program accepts input from a user but does not validate the input properly before using it. This can allow an attacker to send malicious input that could cause the program to behave in an unintended way, such as executing arbitrary code, corrupting data, or stealing information.

      Buffer overflow vulnerabilities occur when a program accepts input that is too large to be stored in the designated memory buffer, allowing an attacker to overwrite adjacent memory addresses with malicious code.

      Access control vulnerabilities occur when a program allows unauthorized access to protected resources or functions, such as allowing a user to execute a function they should not have access to.

      Race conditions occur when multiple processes or threads attempt to access and modify the same resource at the same time, potentially resulting in inconsistent or unexpected behavior.

  8. Who is responsible for overseeing a blockchain electronic ledger?

    • Anyone belonging to the blockchain network
    • A central blockchain authority
    • A central bank
    • A government regulatory body

      Answers Explanation & Hints:

      In a public blockchain network, there is no central authority or regulatory body overseeing the blockchain electronic ledger. The network is maintained by a decentralized community of participants who agree on the rules and validate transactions through a consensus mechanism. Therefore, the answer is “Anyone belonging to the blockchain network”.

      However, private blockchain networks may have a central authority or organization responsible for overseeing the network.

  9. What type of attack allows an attacker to use a brute-force approach?

    • Packet sniffing
    • Password cracking
    • Denial of service
    • Social engineering

      Answers Explanation & Hints:

      A password cracking attack allows an attacker to use a brute-force approach to crack a user’s password. In a password cracking attack, the attacker tries every possible combination of characters until the correct password is guessed. This is typically done using specialized software that can automate the process of generating and testing password guesses.

      Packet sniffing is a technique used to intercept and read network traffic, with the goal of stealing sensitive information such as usernames, passwords, or other confidential data. It does not necessarily involve a brute-force approach.

      Denial of service (DoS) attacks aim to overwhelm a server or network with traffic in order to make it unavailable to users. They do not typically involve brute-force attacks.

      Social engineering attacks involve manipulating or deceiving individuals into divulging sensitive information, rather than relying on brute-force techniques. Examples include phishing, pretexting, or baiting attacks.

  10. ‘Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false?

    • True
    • False

      Answers Explanation & Hints:

      Securing physical access to target equipment is an essential aspect of cybersecurity because it prevents unauthorized access to sensitive data and infrastructure. If an attacker gains physical access to a device or system, they can potentially bypass security measures such as passwords or encryption, making it easier for them to carry out a cyber attack. For example, an attacker can easily install malware or steal sensitive information if they have physical access to a computer. Therefore, it is crucial to ensure that physical access to target equipment is restricted to authorized personnel only, through measures such as locked doors, security cameras, and access controls. This can help minimize the risk of a cyber attack and protect the confidentiality, integrity, and availability of data and systems.

  11. What is a miner?

    • A type of blockchain
    • A person that solves complex mathematical puzzles to verify a transaction
    • A computer that processes and verifies a blockchain transaction
    • An algorithm that predicts the next block of a chain

      Answers Explanation & Hints:

      A miner, in the context of cryptocurrency, is a person or entity that performs the process of verifying transactions on a blockchain network by solving complex mathematical puzzles. The process of verifying transactions involves adding new blocks of transactions to the blockchain ledger. The miners are rewarded for their work with newly created coins or transaction fees. The more miners there are in a network, the more secure and decentralized the network becomes. Miners require specialized computer hardware and software to perform the verification process efficiently.

  12. Which of the following characteristics describe a worm?

    Select two correct answers

    • Infects computers by attaching to software code
    • Executes when software is run on a computer
    • Is self-replicating
    • Travels to new computers without any intervention or knowledge of the user
    • Hides in a dormant state until needed by an attacker

      Answers Explanation & Hints:

      The correct answers are:

      Is self-replicating
      Travels to new computers without any intervention or knowledge of the user
      Explanation: A worm is a type of malware that can replicate itself and spread across networks, often without any user interaction. It can cause damage by consuming bandwidth, overloading networks, and deleting files. Worms can exploit vulnerabilities in operating systems, applications, and devices to spread from one computer to another.

  13. What do you call a program written to take advantage of a known security vulnerability?

    • An exploit
    • Antivirus
    • A firewall
    • A software update

      Answers Explanation & Hints:

      An exploit is a piece of software or code that takes advantage of a vulnerability or weakness in a computer system or application, in order to gain unauthorized access or control of the system. Exploits are often created by hackers and cybercriminals to target specific vulnerabilities in popular software programs or operating systems, and can be used to gain access to sensitive information, install malware or ransomware, or cause damage to the system.

      Exploits can be used in a variety of attacks, including phishing attacks, social engineering attacks, and other types of cyber attacks. Once an exploit is successful, the attacker can take control of the system or application, and use it to launch additional attacks, steal data, or cause other types of damage.

      To protect against exploits, it is important to keep software and operating systems up to date with the latest security patches and updates, and to use strong security measures such as firewalls, antivirus software, and intrusion detection systems. It is also important to be cautious when opening email attachments, downloading software, or clicking on links from unknown sources, as these are often used to deliver exploits to unsuspecting users.

  14. Can you identify the software vulnerability from the following descriptions?

    • Occurs when data is written beyond the limits of memory areas that are allocated to an application
      Buffer Overflow.
    • Occurs when an ordered or timed set of processes is disrupted or altered by an exploit
      Race Condition.
    • Occurs through the improper use of practices that manage equipment, data or applications
      Access Control

      Answers Explanation & Hints:

      Buffer overflow is a type of software vulnerability that occurs when more data is written to a buffer than it can handle. A buffer is a temporary storage area that holds data while it is being transferred from one place to another. If the buffer is not properly managed by the software, it can be overflowed with data that exceeds its capacity, causing it to overwrite other areas of memory. This can cause a crash or unexpected behavior of the software, and in some cases, can be exploited by attackers to execute malicious code.
      Race Condition is a type of software vulnerability that occurs when the proper sequencing of events or the allocation of shared resources in a system is disrupted due to the order and timing of external events, leading to unintended or unexpected behavior. This can occur when multiple processes or threads try to access and modify the same shared resource simultaneously, leading to conflicts and data inconsistencies. Race Conditions can be exploited by attackers to execute malicious code, modify data or gain unauthorized access to systems.
      Access control refers to the practice of restricting access to resources or information only to those who are authorized to use it. It involves implementing security policies, procedures, and technical controls to manage who can access what resources and how they can access them. Access control is important in preventing unauthorized access to sensitive information, systems, and facilities, and in ensuring the confidentiality, integrity, and availability of data. Access control can be implemented through various mechanisms such as user authentication, authorization, and access management tools such as firewalls, intrusion detection systems, and encryption.

  15. Where is cryptocurrency stored?

    • In a wallet
    • On an exchange
    • In a bank account
    • On the blockchain

      Answers Explanation & Hints:

      Cryptocurrency is stored in a digital wallet, which can be either a software application or a physical device designed to securely hold private keys that grant access to one’s cryptocurrency holdings on the blockchain. It is not stored in a bank account or on an exchange, although these platforms may facilitate the buying, selling, or trading of cryptocurrencies.

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments