CompTIA Security + Flashcards
Which of the following secure coding techniques makes compromised code more difficult for hackers to use?
Obfuscation
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?
Take a memory snapshot of the running system
Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?
SLA
The SOC is reviewing processes and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. This allowed the malware to spread to additional hosts before it was contained. Which of the following would be BEST to improve the incident response process?
Updating the playbooks with better decision points
A security analyst is using OSINT to gather information to verify whether company data is available publicly. Which of the following is the best application for the analyst to use?
theHarvester
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has been given the documentation only available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
Gray-Box
A security analyst reviews web server logs and notices the following line:
104.35.45.53 – [22/MAY/2020:07:00:58 +-1–] “GET/WORDPRESS/wp-content/plugins/custom_plugin/check_user.php?userid=1 UNION ALL SELECT user_login,user_pass,user_email from wp_users–HTTP/1.1” 200 1072 “http://www.example.com/wordpress/wp-admin/”
Which of the following vulnerabilities is the attacker trying to exploit?
CSRF
Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. CSRF attacks exploit the trust a Web application has in an authenticated user.
An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?
Production
An organization is outlining data stewardship roles and responsibilities. Which of the following employees roles would determine the purpose of data and how to process it?
Data controller
Which of the following prevents an employee from seeing a colleague who is visiting an inappropriate website?
AUP
An AUP sets rules related to an organization’s IT security policies. These include rules around accessing restricted information; changing access data, such as passwords; opening questionable email attachments; using public Wi-Fi services; and using company approved authentication procedures.
A document that appears to be malicious has been discovered in an email that was sent to a company’s CFO. Which of the following would be BEST to allow a security analyst to gather information and confirm it is malicious document without executing any code it may contain?
Detonate the document in an analysis sandbox
A security analyst notices that specific files are being deleted each time a systems administrator is on vacation. Which of the following BEST describes the type of malware that is running?
Logic bomb
A candidate attempts to go to http://comptia.org but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following BEST describes this type of attack?
Typosquatting
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better:
Prioritize remediation of vulnerabilities based on the possible impact
A company is looking to migrate some servers to the cloud to minimize its technologies footprint. The company has 100 databases that are on premises. Which of the following solutions will require LEAST management and support from the company?
IaaS
Infrastructure as a Service (IaaS) is a business model that delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet. You can use IaaS to request and configure the resources you require to run your applications and IT systems.
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
Applying MDM Software
While reviewing an alert that shows a malicious request on one web application, a cybersecurity analyst is alerted to a subsequent token reuse moments later on a different service using the same single sign-on method. Which of the following would BEST detect a malicious actor?
Utilizing SIEM correlation engines
In a rush to meet an end of year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer’s response?
Risk acceptance
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service providers types should the business engage?
IaaS
Infrastructure as a Service (IaaS) is a business model that delivers IT infrastructure like compute, storage, and network resources on a pay-as-you-go basis over the internet. You can use IaaS to request and configure the resources you require to run your applications and IT systems.
Which of the following BEST represents an application that does not have an on-premises requirement and is accessible from anywhere?
SaaS
Software as a Service
A small local company experienced a ransomware attack. The company has one web-facing server and a few workstations. Everything is behind an ISP firewall. A single web-facing server is set up on the router to forward al polls so that the server is viewable from the internet. The company uses an older version of third-party software to manage the website. The assets were never patched. Which the following should be done to prevent an attack like this from happening again?
Use the latest version of software
Implement a screened subnet for the web server
Install an endpoint security solution
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?
Perform a mathematical operation on the passwords that will convert them into unique strings.
A data center has experienced an increase in under-voltage events following electrical grid maintenance outside the facility. These events are leading to occasional losses of system availability. Which of the following would be the most cost-effective solution for th data center to implement?
Uninterruptible power supplies with battery backup
Which of the following best describes a technique that compensates researchers for finding vulnerabilities?
Bug Bounty
Which of the following would be MOST effective to contain a rapidly spreading attack that is affecting a large number of organizations?
DNS sinkhole
An analyst is trying to identify insecure services that are running on the internal network. After performing a port scan, the analyst identifies that a server has some insecure services enabled on default ports. Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them?
HTTP, HTTPS
Telnet, SSH
TLS, SSL
The new CISO at a company has asked the security team to implement stronger user account policies. The new policies require:
-Users to choose a password unique to their last ten passwords
-Users to not login from certain high-risk countries
Which of the following should the security team implement?
Password history
Geolocation
A third party asked a user to share a public key of secure communication. Which of the following file formats should the user choose to share the key?
.cer
During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. One the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user’s intranet account? Choose 2
Federation
Password complexity
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log in to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? choose two
VDI and RFID
Which of the following would be the best way to block unknown programs from executing?
Application allow list
A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer to the NAS, even thought the data is still viewable from the users’ PC. Which of the following is the MOST likely cause of this issue?
SSH was turned of instead of modifying the configuration file.
Which of the following is the MOST effective control against zero-day vulnerabilities?
Patch management
Which of the following algorithms has the SMALLEST key size?
DES
Data Encryption Standard (DES) is an outdated symmetric key method of data encryption. It was adopted in 1977 for government agencies to protect sensitive data and was officially retired in 2005. IBM researchers originally designed the standard in the early 1970s.
A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?
Password complexity
A company has limited storage space available and an online presence that cannot be down for more than four hours. Which of the following backup methodologies should the company implement to allow of the FASTEST database restore time in the event of a failure, while being mindful of the limited available storage space?
Implement full backups every Sunday at 8:00PM and nightly differential backups at 8:00 PM
A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?
Wildcard
Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?
- Standard naming conventions
- Domain services
-Baseline configurations
-Diagrams
Domain Services
A security analyst is reviewing the following output form a system:
TCP 192.168.10.10:80 192.168.1.2:60101 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60102 TIME_WAIT
TCP 192.168.10.10:80 192.168.1.2:60103 TIME_WAIT
Which of the following most likely being observed?
-ARP poisoning
-Man in the middle
-Denial of service
-DNS poisoning
Denial of Service
Which of the following actions would be recommended to improve an incident response process?
- Train the team to identify the difference between events and incidents
- Modify access so the IT team has full access to the compromised assets
- Contact the authorities of a cybercrime is suspected
- Restrict communication surrounding the response to the IT team
Train the team to identify the differences between events and incidents
A security engineer is deploying g anew wireless network for a company. The company shares office space with multiple tenants. Which of the following should the engineer configure on the wireless network to ensure that confidential data is not exposed to unauthorized users?
-EAP
-TLS
-HTTPS
-AES
AES
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to encrypt sensitive data.
A user is having network connectivity issues when working from a coffee shop. The user has used the coffee shop as a workspace for several months without any issues. None of the other customers at the coffee shop are experiencing these issues. A help desk analyst at the user’s company reviews the following wi-fi log:
08:13:40. Coffee_Wifi. Network connected. 5GHz
08:13:45. Coffee_Wifi. Network disconnected. 5GHz
09:04:10. Coffee_Wifi. Network connected. 5GHz
09:04:15. Coffee_Wifi. Network disconnected. 5GHz
-Another customer has configured a rogue access point
-The coffee shop network is using multiple frequencies
-A denial-of-service attack by disassociation is occurring
-An evil twin access point is being utilized
A denial-of-service attack by disassociation is occurring
A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources. This is usually accomplished by flooding the targeted host or network with traffic until the target can’t respond or crashes.
While checking logs, a security engineer notices a number of users suddenly downloading files with the .tar .gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following MOST likely occurring?
-A RAT was installed and is transferring additional exploit tools
-The workstations are beaconing to a command-and-control server
-A logic bomb was executed and is responsible for the data transfers
-A fileless virus is spreading in the local network environment
The workstations are beaconing to a command-and-control server
A systems administrator receives the following alert from a file integrity monitoring tool:
The hash of the cmd.exe files has changed
The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?
-The end user changed the file permissions
-A cryptographic collision was detected
-A snapshot of the file system was taken
-A rootkit was deployed
A rootkit was deployed
A systems analyst is responsible for generating a new digital forensics chain of custody form. Which of the following should the analyst include in this documentation? Choose two
-The order of volatility
-A forensics NDA
-The provenance of the artifacts
-The vendor’s name
-The date and time
-A warning banner
The order of volatility
The date and time
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from recurring?
- Job rotation
- Retention
- Outsourcing
-Separation of duties
Job rotation
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?
-Data masking
-Encryption
-Geolocation policy
-Data sovereignty regulation
Geolocation policy
Which of the following authentication methods is considered to be LEAST secure?
-TOTP
-SMS
-HOTP
-Token Key
SMS
A penetration-testing firm is working with local community bank to create a proposal that best fits the needs of the bank. The bank’s information security manager would like the penetration test to resemble a real attack scenario, but it cannot afford the hours required by the penetration-testing firm. Which of the following would best address the bank’s desired scenario and budget?
-Engage the penetration testing firm’s real-team services to fully mimic possible attackers
-Give the penetration tester data diagrams of core banking applications in a known-environment test
-Limit the scope of the penetration test to only the system that is used for teller workstations
-Provide limited networking details in a partially known-environment test to reduce reconnaissance efforts.
-Provide limited networking details in a partially known-environment test to reduce reconnaissance efforts.
A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult.
-GDPR
-ISO
-NIST
-PCI DSS
GDPR
General Data Protection Regulation (GDPR). Only if a processing of data concerns personal data, the General Data Protection Regulation applies. The term is defined in Art.
Which of the following is a reason to publish files’ hashes?
-To validate the integrity of the files
-To verify if the software was digitally signed
-To use the hash as a software activation key
-To use the hash as a decryption passphrase
To validate the integrity of the files
After installing a patch on a security appliance, an organization realized a massive data exfiltration had occurred. Which of the following BEST describes the incident?
-Supply Chain Attack
-Ransomware Attack
-Cryptographic Attack
-Password Attack
Supply Chain Attack
Stakeholders at an organization must be kept aware of any incidents and receive updates on status changes as they occur. Which of the following plans would fulfill this requirement?
-Communication plan
-Disaster recovery plan
-Business continuity plan
-Risk plan
Communication plan
Which of the following is the FIRST environment in which proper, secure coding should be practiced?
-Stage
-Development
-Production
-Test
Development
Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day to day business operations. Which of the following documents did Ann receive?
-An annual privacy notice
-A non disclosure agreement
-A privileged user agreement
-A memorandum of understanding
An annual privacy notice
A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?
- Disable Telnet and force SSH
- Establish a continuous ping
- Utilize an agentless monitor
- Enable SNMPv3 with passwords
Utilize an agentless monitor
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
- Intellectual property theft
-Elevated privileges
-Unknown backdoor
-Quality assurance
Unknown backdoor
A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output:
CPU 0 percent busy, from 300 sec ago
1 sec ave: 99 percent busy
5 sec ave: 97 percent busy
1 min ave: 83 percent busy
Which of the following is the router experiencing?
-DDoS Attack
-Memory leak
-Buffer overflow
-Resource exhaustion
Resource exhaustion
A security analyst has received an alert about PII being sent via email. The analyst’s CISO has made it clear that PII must be handled with extreme care. From which of the following did the alert MOST likely originate?
- S/MIME
-DLP
-IMAP
-HIDS
DLP
An analyst visits an Internet forum lookin for information about a tool. The analyst finds a thread that appears to contain relevant information. One of the posts says the following:
Hello everyone,
I’m having the same problem with my server. Can you help. me?
<script type=”text/javascript” src=http://website.com/user.js>Onload=sqlexec(); </script>
Thank you,
Joe
Which of the following BEST describes the attack that was attempted against the forum readers?
-SQLi attack
-DLL attack
-XSS attack
-API attack
XSS attack
Cross-site scripting (XSS) is an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website. Attackers often initiate an XSS attack by sending a malicious link to a user and enticing the user to click it.
An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process to execute a payload. Which of the following attacks did the analyst observe?
-Privilege escalation
-Request forgeries
-Infection
-Replay attack
Privilege escalation
A company reduced the area utilized in its data center by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?
- IaC
-MSSP
-Containers
-SaaS
IaC
Infrastructure as code (IaC) security is the embedding of consistent, scalable cloud security coverage that helps to detect misconfiguration in code early in the software development life cycle to prevent vulnerabilities at runtime.
A network manager wants to protect the company’s VPN by multi factor authentication that uses:
-Something you know
-Something you have
-Something you are
Which of the following would accomplish the manager’s goals?
-Domain name, PKI, GeoIP lookup
-VPN IP address, Company ID, Partner Site
-Password, authentication token, thumbprint
-Company URL, TLS certificate, home address
Domain name, PKI, GeoIP Lookup
During a security assessment, a security analyst finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups a remove the set-user-ID bit from the file?
-Is
-chflags
-chmod
-Isof
-setuid
chmod
An administrator identifies some locations on the third floor of the building that have a poor wireless signal Multiple users confirm the incident and report it is not an isolated event. Which of the following should the administrator use to find the areas with a poor or non-existent wireless signal?
-Heat map
-Input validation
-Site survey
-Embedded systems
Site survey
A security administrator wants to implement a program that tests a user’s ability to recognize attacks over the organization’s email system. Which of the following would best suited for this task?
-Social media analysis
-Annual information security training
-Gamification
-Phishing campaign
Phishing campaign
A company received a “right to be forgotten” request to legally comply, the company must remove data related to the requester from its systems. Which of the following is the most company most likely complying with?
GDPR
General Data Protection Legislation. It is a European Union (EU) law that came into effect on 25th May 2018. GDPR governs the way in which we can use, process, and store personal data (information about an identifiable, living person).
A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how future incidents can be avoided. During which of the following stages of the response process will this activity take place?
-Recovery
-Identification
-Lessons learned
-Preparation
Lessons learned
Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyber-intrusions, phishing, and other malicious cyber activity?
-Intelligence fusion
-Review reports
-Log reviews
-Threat feeds
Threat feeds
A systems administrator is auditing all company servers to ensure they meet minimum security baseline. While auditing a Linux server, the systems administrator observes the /ect/shadow file has permissions beyond the baseline recommendations. Which of the following commands should the system administrator use to resolve this issue?
-chmod
-grep
-dd
-passwd
chmod
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
-Security information and event management
-A web application firewall
-A vulnerability scanner
-A next-generation firewall
Security information and event management
Which of the following components can be used to consolidate and forward inbound internet traffic to multiple cloud environments through a single firewall?
-Transit gateway
-Cloud hot site
-Edge computing
-DNS sinkhole
Transit gateway
A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?
-Public
-Community
-Hybrid
-Private
Hybrid
After a ransomware attack, a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?
-The public ledger
-The NetFlow data
-A checksum
-The event log
The public ledger