2.4.5 Section Quiz
pdf
keyboard_arrow_up
School
Eastern Gateway Community College *
*We aren’t endorsed by this school
Course
NET232
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
5
Uploaded by AmbassadorDiscovery11913
10/15/23, 11:23 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/5ff6c70b-9734-407f-b46b-a79656264411/exam-session/31151705/68ec89c7-1976-4bbb-8…
1/5
Score: 100%
Passing Score: 80%
Question 1:
Correct
Every ACME computer comes with the same account created at the factory. Which kind of vulnerability is this?
Weak passwords
Misconfigurations
Backdoor
Default accounts and passwords
Explanation
The factory account is considered a default account and would be a well-known default password.
This is not a backdoor, as it is not hard-coded.
This is not a misconfiguration because it is the factory default setting.
Although the password is weak because it is well-known, a default password could still be considered complex if it meets password
complexity requirements.
References
2.4.1 Vulnerability Concerns
2.4.2 Vulnerability Concerns Facts
2.4.3 Impact of Vulnerabilities
2.4.4 Impact of Vulnerabilities Facts
4.2.2 Hardening Facts
4.4.1 Linux Host Security
4.4.2 Removing Unnecessary Services
4.4.4 Configure iptables
4.4.5 Configure iptables Facts
8.3.1 Wireless Security
8.3.2 Wireless Security Facts
q_vuln_default_secp7.question.fex
Question 2:
Correct
In healthcare, regulations often dictate that important systems remain unpatched to maintain compliance. Which kind of vulnerability
does this introduce?
Misconfigurations
Inherent vulnerabilities
Weak passwords
Application flaws
Explanation
INDIVIDUAL RESPONSES
OBJECTIVE ANALYSIS
10/15/23, 11:23 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/5ff6c70b-9734-407f-b46b-a79656264411/exam-session/31151705/68ec89c7-1976-4bbb-8…
2/5
Important systems may have to be left unpatched to comply with regulations or other constraints. This leads to these systems having
inherent vulnerabilities that must be mitigated through other security controls.
Weak passwords are passwords that are blank, too short, dictionary words, or overly simple.
Application flaws are flaws in the validation and authorization of users. These flaws present the greatest threat to security in
transactional applications.
The primary cause of misconfiguration is human error.
References
2.4.2 Vulnerability Concerns Facts
13.2.3 Analyzing Risks
13.2.4 Analyzing Risks Facts
q_vuln_inherent_secp7.question.fex
Question 3:
Correct
Which security control, if not applied, can allow an attacker to bypass other security controls?
Principle of least privilege
Changing default passwords
Updating firmware or software
Physical access control
Explanation
With physical access to a system, many security controls can be circumvented. It is important to secure access to devices.
References
2.4.2 Vulnerability Concerns Facts
14.2.1 Control Categories and Types
14.2.2 Control Categories and Types Facts
q_vuln_physical_secp7.question.fex
Question 4:
Correct
A user is able to access privileged administrative features with an account that is not granted administrator rights. Which type of
vulnerability is this?
Weak passwords
Backdoor account
Stealing administrator credentials
Privilege escalation
Explanation
Privilege escalation allows a user to gain privileges that aren't normally available to that user.
A backdoor account vulnerability would imply that the user knew a secret password in addition to their account.
Stealing administrator credentials is not privilege escalation because the account used already-granted privileges.
Weak passwords would not grant a user more privileges than what the account is configured for.
References
10/15/23, 11:23 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/5ff6c70b-9734-407f-b46b-a79656264411/exam-session/31151705/68ec89c7-1976-4bbb-8…
3/5
2.4.2 Vulnerability Concerns Facts
5.9.2 Device Vulnerability Facts
6.1.4 Access Control Best Practices
q_vuln_privilege_secp7.question.fex
Question 5:
Correct
The root account has all privileges and no barriers. Which of the following is another name for the root account?
User account
Backdoor account
Default account
Superuser account
Explanation
The root account is also known as the superuser account because it has the privilege to do anything on the system.
It is possible that a default account or a backdoor account could have superuser privileges, but these accounts are not inherently root
accounts.
References
2.4.1 Vulnerability Concerns
2.4.2 Vulnerability Concerns Facts
2.4.3 Impact of Vulnerabilities
2.4.4 Impact of Vulnerabilities Facts
4.4.2 Removing Unnecessary Services
q_vuln_root_secp7.question.fex
Question 6:
Correct
A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?
Default settings
Unpatched software
Weak security configurations
Zero-day exploit
Explanation
Configuring a wireless access point with WEP would be considered a weak security configuration because WEP has been shown to be
insecure.
WEP is not a zero-day exploit because it is known to be a vulnerability. WEP is not a default setting on modern wireless access points
and cannot be patched to become secure, so it is not an example of unpatched software.
References
2.4.2 Vulnerability Concerns Facts
q_vuln_weak_secp7.question.fex
Question 7:
Correct
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10/15/23, 11:23 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/5ff6c70b-9734-407f-b46b-a79656264411/exam-session/31151705/68ec89c7-1976-4bbb-8…
4/5
Sometimes, an attacker's goal is to prevent access to a system rather than to gain access. This form of attack is often called a denial-
of-service attack and causes which impact?
Data loss
Availability loss
Data exfiltration
Identity theft
Explanation
Denial-of-service (DoS) attacks intend to create availability loss to an important service. An example would be a botnet being used to
exhaust the resources of a web server in order to deny access to the websites that it hosts.
Data loss, data exfiltration, and identity theft are not the main purposes of denial-of-service attacks.
References
2.4.1 Vulnerability Concerns
2.4.2 Vulnerability Concerns Facts
2.4.3 Impact of Vulnerabilities
2.4.4 Impact of Vulnerabilities Facts
9.5.3 Cloud Security Controls Facts
q_impact_vuln_availabliity_secp7.question.fex
Question 8:
Correct
When confidential or protected data is exposed, either intentionally or accidentally, it is considered to be which of the following?
Availability loss
Data breach
Data exfiltration
Data loss
Explanation
A data breach is when confidential or protected data is exposed. Data loss involves the loss of important data, such as a file being
deleted. Data exfiltration could be used during a data breach, but it in itself is not the definition of a data breach. Availability loss would
be an attack where the attacker is preventing authorized users from accessing the systems.
References
2.4.1 Vulnerability Concerns
2.4.2 Vulnerability Concerns Facts
2.4.3 Impact of Vulnerabilities
2.4.4 Impact of Vulnerabilities Facts
q_impact_vuln_breach_secp7.question.fex
Question 9:
Correct
DNS tunneling is a common method that allows an attacker to accomplish which attack?
Medical identity theft
Data exfiltration
10/15/23, 11:23 AM
TestOut LabSim
https://labsimapp.testout.com/v6_0_573/exam-engine.html/5ff6c70b-9734-407f-b46b-a79656264411/exam-session/31151705/68ec89c7-1976-4bbb-8…
5/5
Availability loss
Data loss
Explanation
A common tactic attackers use for data exfiltration is DNS tunneling. DNS tunneling is a method that allows an attacker to hide data
being sent to an outside host by disguising it as DNS traffic on UDP port 53. Because DNS is critical to most network operations, it is
generally not blocked on the firewall.
The other answers are not directly associated with DNS tunneling.
References
2.4.1 Vulnerability Concerns
2.4.2 Vulnerability Concerns Facts
2.4.3 Impact of Vulnerabilities
2.4.4 Impact of Vulnerabilities Facts
q_impact_vuln_exfiltration_secp7.question.fex
Question 10:
Correct
Which impact of vulnerabilities occurs when an attacker uses information gained from a data breach to commit fraud by doing things
like opening new accounts with the victim's information?
Data exfiltration
Identity theft
Data loss
Availability loss
Explanation
Identity theft is when an attacker uses data from a victim to commit fraud. Data loss is the loss of files and documents, either
accidentally or through malicious acts. Data exfiltration is the transfer of information or files from a computer without authorization.
Availability loss is when an attacker performs a malicious act to make a network so busy that the whole system goes down.