CompTIA Security + Flashcards
Which of the following secure coding techniques makes compromised code more difficult for hackers to use?
Obfuscation
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?
Take a memory snapshot of the running system
Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?
SLA
The SOC is reviewing processes and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. This allowed the malware to spread to additional hosts before it was contained. Which of the following would be BEST to improve the incident response process?
Updating the playbooks with better decision points
A security analyst is using OSINT to gather information to verify whether company data is available publicly. Which of the following is the best application for the analyst to use?
theHarvester
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has been given the documentation only available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
Gray-Box
A security analyst reviews web server logs and notices the following line:
104.35.45.53 – [22/MAY/2020:07:00:58 +-1–] “GET/WORDPRESS/wp-content/plugins/custom_plugin/check_user.php?userid=1 UNION ALL SELECT user_login,user_pass,user_email from wp_users–HTTP/1.1” 200 1072 “http://www.example.com/wordpress/wp-admin/”
Which of the following vulnerabilities is the attacker trying to exploit?
CSRF
Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. CSRF attacks exploit the trust a Web application has in an authenticated user.
An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?
Production
An organization is outlining data stewardship roles and responsibilities. Which of the following employees roles would determine the purpose of data and how to process it?
Data controller
Which of the following prevents an employee from seeing a colleague who is visiting an inappropriate website?
AUP
An AUP sets rules related to an organization’s IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.
A document that appears to be malicious has been discovered in an email that was sent to a company’s CFO. Which of the following would be BEST to allow a security analyst to gather information and confirm it is malicious document without executing any code it may contain?
Detonate the document in an analysis sandbox
A security analyst notices that specific files are being deleted each time a systems administrator is on vacation. Which of the following BEST describes the type of malware that is running?
Logic bomb
A candidate attempts to go to http://comptia.org but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following BEST describes this type of attack?
Typosquatting
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better:
Prioritize remediation of vulnerabilities based on the possible impact
A company is looking to migrate some servers to the cloud to minimize its technologies footprint. The company has 100 databases that are on premises. Which of the following solutions will require LEAST management and support from the company?
IaaS
Infrastructure as a Service (IaaS) is a business model that delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet. You can use IaaS to request and configure the resources you require to run your applications and IT systems.
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
Applying MDM Software
While reviewing an alert that shows a malicious request on one web application, a cybersecurity analyst is alerted to a subsequent token reuse moments later on a different service using the same single sign-on method. Which of the following would BEST detect a malicious actor?
Utilizing SIEM correlation engines
In a rush to meet an end of year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer’s response?
Risk acceptance
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service providers types should the business engage?
IaaS
Infrastructure as a Service (IaaS) is a business model that delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet. You can use IaaS to request and configure the resources you require to run your applications and IT systems.
Which of the following BEST represents an application that does not have an on-premises requirement and is accessible from anywhere?
SaaS
Software as a Service
A small local company experienced a ransomware attack. The company has one web-facing server and a few workstations. Everything is behind an ISP firewall. A single web-facing server is set up on the router to forward al polls so that the server is viewable from the internet. The company uses an older version of third-party software to manage the website. The assets were never patched. Which the following should be done to prevent an attack like this from happening again?
Use the latest version of software
Implement a screened subnet for the web server
Install an endpoint security solution
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?
Perform a mathematical operation on the passwords that will convert them into unique strings.
A data center has experienced an increase in under-voltage events following electrical grid maintenance outside the facility. These events are leading to occasional losses of system availability. Which of the following would be the most cost-effective solution for th data center to implement?
Uninterruptible power supplies with battery backup
Which of the following best describes a technique that compensates researchers for finding vulnerabilities?
Bug Bounty