Skip to content

Commit ce25f49

Browse files
Added new questions and answers to cybersecurity quiz (#7218)
1 parent 70e5ce1 commit ce25f49

File tree

1 file changed

+89
-0
lines changed

1 file changed

+89
-0
lines changed

cybersecurity/cybersecurity-quiz.md

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1322,3 +1322,92 @@ Source: [SANS Institute - Social Engineering Attacks](https://www.sans.org/blog/
13221322
A Security Information and Event Management (SIEM) system is a security solution that collects, analyzes, and correlates security-related data from various sources within an organization. The primary purpose of a SIEM is to provide a centralized view of an organization's security posture, detect and respond to security incidents, and generate reports for compliance and auditing purposes. It is not primarily used for encryption, password management, or blocking all network traffic.
13231323

13241324
Source: [NIST Special Publication 800-94 - Guide to Intrusion Detection and Prevention Systems (IDPS)](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-94.pdf)
1325+
1326+
#### Q171. A company detects multiple failed SSH login attempts from the same IP, followed by a successful one with elevated privileges. Which attack pattern does this scenario most likely indicate?
1327+
1328+
- [ ] SQL Injection
1329+
- [x] Brute Force Attack
1330+
- [ ] Cross-Site Request Forgery
1331+
- [ ] DNS Spoofing
1332+
1333+
1334+
1335+
#### Q172. You’re a SOC analyst and notice an outbound HTTPS connection from a workstation to an IP with no DNS record, persisting every 10 minutes. What might this behavior indicate?
1336+
1337+
- [x] Command and Control (C2) beaconing activity
1338+
- [ ] Misconfigured VPN tunnel keepalive
1339+
- [ ] Normal system heartbeat to monitoring service
1340+
- [ ] Outdated TLS handshake attempts
1341+
1342+
1343+
1344+
#### Q173. Which of the following actions can help mitigate **lateral movement** after an initial system compromise? *(Select all that apply)*
1345+
1346+
- [x] Implementing network segmentation and isolation policies
1347+
- [x] Enforcing Just-In-Time (JIT) privileged access
1348+
- [ ] Disabling application logging to reduce noise
1349+
- [ ] Using shared administrative credentials for faster access
1350+
1351+
1352+
1353+
#### Q174. True or False:
1354+
TLS 1.3 encrypts more of the handshake process than TLS 1.2, reducing the visibility of certificate exchange for network-based intrusion detection systems.
1355+
1356+
- [x] True
1357+
- [ ] False
1358+
1359+
1360+
1361+
#### Q175. During a red team exercise, the attacker injects malicious DLLs into a trusted process like `explorer.exe` to execute payloads without spawning new processes. What is this technique called?
1362+
1363+
- [x] Process Injection
1364+
- [ ] API Hooking
1365+
- [ ] Kernel Exploitation
1366+
- [ ] Sandbox Evasion
1367+
1368+
#### Q176. An organization detects that sensitive data has been exfiltrated through DNS queries. Upon investigation, it’s discovered that attackers encoded the data into base64 strings and sent them as part of subdomain requests to an external DNS server. Which type of attack does this represent?
1369+
1370+
- [x] DNS Tunneling
1371+
- [ ] Domain Generation Algorithm (DGA)
1372+
- [ ] ARP Poisoning
1373+
- [ ] Reverse Shell Injection
1374+
1375+
1376+
1377+
#### Q177. You’re a security engineer analyzing an alert where an attacker exploited a deserialization vulnerability in a Java-based web service. The payload executed arbitrary commands by injecting malicious objects into serialized data streams.
1378+
Which control would most effectively mitigate this class of vulnerability?
1379+
1380+
- [x] Validating and restricting classes allowed during deserialization using a whitelist
1381+
- [ ] Applying TLS encryption to serialized objects
1382+
- [ ] Blocking all HTTP POST requests
1383+
- [ ] Deploying a WAF with rate limiting only
1384+
1385+
1386+
1387+
#### Q178. In a Zero Trust Network (ZTN) model, a user with valid credentials attempts to access a resource they’ve never used before. The access request triggers behavioral analytics, location-based validation, and device posture checks before granting conditional access.
1388+
What key Zero Trust principle is being applied here?
1389+
1390+
- [x] Continuous verification based on context and trust score rather than static authentication
1391+
- [ ] Default allow principle to improve user experience
1392+
- [ ] Identity federation between cloud and on-prem systems
1393+
- [ ] Role-based access without session evaluation
1394+
1395+
1396+
1397+
#### Q179. A ransomware strain infiltrates a company via a phishing email, encrypts local data, and then spreads through SMB shares to connected systems.
1398+
Which combination of defenses would most effectively reduce both **initial infection** and **lateral propagation** risks? *(Select all that apply)*
1399+
1400+
- [x] Disabling macros and enforcing email attachment scanning
1401+
- [x] Network segmentation and least privilege access to shared drives
1402+
- [ ] Storing encryption keys locally on endpoints for faster recovery
1403+
- [ ] Using a static IP whitelist for outbound traffic only
1404+
1405+
1406+
#### Q180. During a cloud incident response, the team discovers that a compromised IAM role was used to create new API keys and spin up compute instances for crypto mining.
1407+
Which forensic and remediation steps should be prioritized to contain and investigate the breach? *(Select all that apply)*
1408+
1409+
- [x] Immediately revoke and rotate all credentials associated with the compromised IAM role
1410+
- [x] Review CloudTrail or equivalent logs to trace actions and identify attacker persistence methods
1411+
- [x] Apply restrictive IAM policies with least privilege on service accounts
1412+
- [ ] Disable logging and auditing temporarily to preserve performance
1413+

0 commit comments

Comments
 (0)