Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You recently purchased a smart thermostat for your home. It allows you to control the temperature remotely through a mobile app. Considering the security of your new smart thermostat, which of the following actions would be the LEAST effective In protecting It from unauthorized access?

A.

Keeping the thermostat firmware updated with the latest security patches from the manufacturer.

B.

Leaving the thermostat connected to the "Guest" Wi-Fi network in your home, which is open to all guests.

C.

Changing the default password for the mobile app and thermostat upon initial setup.

D.

Enabling remote access to the thermostat only on your secure home Wi-Fi network.

In a multinational corporation, the IT department Implemented a new network security protocol for their global data centers. This protocol was designed to enhance security measures by incorporating advanced access control principles. The protocol employs a combination of methods to ensure that only authorized personnel can access sensitive data. Recently, an incident occurred where an unauthorized user gained access to confidential data. The securityteam discovered that the intruder exploited a specific aspect of the access control system. Which aspect of the access control principles, terminologies, and models was most likely exploited?

A.

Attribute-Based Access Control {ABAC), where access decisions are made based on a set of policies and attributes.

B.

Discretionary Access Control (DAC). where the resource owner decides on the access permissions.

C.

Role-Based Access Control (RBAC). where access is given based on the roles within the organization.

D.

Mandatory Access Control (MAC), where access decisions are made based on predefined rules set by the system s administrator.

A John-the-Ripper hash dump of an FTP server’s login credentials is stored as "target-file" on the Desktop of Attacker Machine-2. Crack the password hashes in the file to recover the login credentials of the FTP server. The FTP root directory hosts an exploit file. Read the exploit file and enter the name of the exploit's author as the answer. Hint: Not all the credentials will give access to the FTP. (Practical Question)

A.

ByteDefender

B.

CodeGuard

C.

QcipherShield

D.

nullsecurlty

You are the chief cybersecurity officer at a multi-national corporation, which specializes in satellite-based communication systems. Recently, you transitioned to a more advanced system architecture that includes multiple ground stations globally. These stations synchronize and communicate via a central hub that manages the distribution of encrypted data across the network. Upon reviewing the quarterly network logs, you uncover a series of sophisticated intrusions. These intrusions are intermittently taking place inground stations located in three continents. Evidence suggests that these attacks are coordinated, aiming to map out the network's communication paths, likely in preparation for a much larger scale cyber-attack. Further investigation uncovers small pockets of malware within the system, specifically designed to circumvent your current security controls. Given the criticality of ensuring uninterrupted satellite communication, which countermeasure would be most effective in thwarting these intrusions, ensuring data integrity, and maintaining the operational status of your satellite communication systems?

A.

Enhance end-point security solutions at each ground station, focusing on advanced malware detection, eradication, and prevention.

B.

Implement air-gapped systems for each ground station to ensure complete isolation, minimizing the risk of malware spread and external intrusions.

C.

Deploy an advanced network segmentation strategy, ensuring each ground station operates in a micro-segmented environment, with real-time threat monitoring and dynamic policy adjustments.

D.

Rollback the system to its previous architecture, while launching a thorough investigation into the identified intrusions and taking the necessary legal actions.

RAT has been setup in one of the machines connected to the network to steal the important Sensitive corporate docs located on Desktop of the server, further investigation revealed the IP address of the server 20.20.10.26. Initiate a remote connection using thief client and determine the number of files present in the folder.

Hint: Thief folder is located at: Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.

A.

2

B.

4

C.

3

D.

5

DigitalVault Corp., a premier financial institution, has recently seen a significant rise in advanced persistent threats (APTs)targetlng Its mainframe systems. Considering the sensitivity of the data stored, It wants to employ a strategy that deceives attackers into revealing their techniques. As part of its defense strategy, the cybersecurity team is deliberating over-deploying a honeypot system. Given the bank's requirements, the team are evaluating different types of honeypots. DigitalVault's primary goal Is to gather extensive Information about the attackers' methods without putting its actual systems at risk. Which of the following honeypots would BEST serve DigitalVault’s intent?

A.

High-interaction honeypots, offering a real system's replica for attackers, and observing their every move.

B.

Low-interaction honeypots, designed to log basic information such as IP addresses and attack vectors.

C.

Reserch honeypots, aimed at understanding threats to a specific industry and sharing insights with the broader community.

D.

Production honeypots, which are part of the organization's active network and collect information about dally attacks.

A global financial services firm Is revising its cybersecurity policies to comply with a diverse range of international regulatory frameworks and laws. The firm operates across multiple continents, each with distinct legal requirements concerning data protection, privacy, and cybersecurity. As part of their compliance strategy, they are evaluating various regulatory frameworks to determine which ones are most critical to their operations. Given the firm's international scope and the nature of its services, which of the following regulatory frameworks should be prioritized for compliance?

A.

ISO 27001 Information Security Management System

B.

ISO 27002 Code of Practice for information security controls

C.

Qceneral Data Protection Regulation (CDPR) - European Union

D.

NIST Cybersecurity Framework

Thomas, an employee of an organization, is restricted from accessing specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.

A.

Vishing

B.

Eavesdropping

C.

Phishing

D.

Dumpster diving

Identify a machine in the network with 5SH service enabled. Initiate an SSH Connection to the machine, find the file, ttag.txt. in the machine, and enter the tile's content as the answer. The credentials tor SSH login are sam/adm(admin@123. {Practical Question)

A.

sam@bob

B.

bob2@sam

C.

sam2@bob

D.

bobt@sam

An advanced persistent threat (APT) group known for Its stealth and sophistication targeted a leading software development company. The attack was meticulously planned and executed over several months. It involved exploiting vulnerabilities at both the application level and the operating system level. The attack resulted in the extraction of sensitive source code anddisruption of development operations. Post-incident analysis revealed multiple attack vectors, including phishing, exploitation of unknown/unpatched vulnerabilities in software/hardware. and lateral movement within the network. Given the nature and execution of this attack, what was the primary method used by the attackers to initiate this APT?

A.

Exploiting default passwords to gain initial access to the network.

B.

Exploiting a zero-day vulnerability in the application used by developers.

C.

Exploiting a known vulnerability in the firewall to bypass network defenses.

D.

Compromising a third-party vendor with access to the company's development environment.