CompTIA Security+ 701 Practice Test 1 Flashcards
In the context of Zero Trust, what is the role of the Policy Engine?
A. To enforce the security policies
B. To manage policies
C. To create implicit trust zones
D. To define the security policies
To define the security policies
The Policy Engine in Zero Trust focuses on defining the security policies.
Which of the following is an example of a directive control?
A. Access control vestibule
B. Incident response plan
C. Security policy
D. Firewall
Security policy
A directive control as it guides actions and processes.
Which of the following is a physical security control?
A. Security policy
B. Incident response plan
C. Access badge
D. Firewall
Access badge
A physical control used to regulate access to a facility.
Which of the following best describes the ‘A’ in the AAA model?
A. Authorization
B. Adaptive identity
C. Accounting
D. Authentication
Authorization
Refers to granting or denying access to resources.
What type of security control is a security guard?
A. Deterrent
B. Operational
C. Technical
D. Managerial
Deterrent
A deterrent control as their presence can discourage potential attackers.
What is the main goal of authentication in the context of security?
A. To grant or deny access to resources
B. To discourage potential attackers
C. To provide proof of the origin of data
D. To verify the identity of a user or system
To verify the identity of a user or system
Authentication is the process of verifying the identity of a user or system.
Which of the following is an example of a detective control?
A. Firewall
B. Access badge
C. Security policy
D. Video surveillance
Video surveillance
A detective control as it helps in detecting unauthorized activities.
Which of the following is NOT a component of physical security?
A. Bollards
B. Policy Engine
C. Access control vestibule
D. Lighting
Policy Engine
A component of the Zero Trust model, not physical security.
What is the purpose of an approval process in change management?
A. To ensure that the proposed change is reviewed and authorized by the appropriate stakeholders.
B. To update the diagrams and policies/procedures.
C. To identify the dependencies of the change.
D. To schedule a specific time frame for performing the change.
To ensure that the proposed change is reviewed and authorized by the appropriate stakeholders.
The approval process in change management ensures that the proposed change is reviewed and authorized by the appropriate stakeholders before it is implemented. This helps in ensuring that the change is necessary, well-planned, and will not adversely affect the organization’s operations or security.
Which of the following is NOT a level of encryption?
A. Full-disk
B. Tokenization
C. Volume
D. Record
Tokenization
A method of replacing sensitive data with non-sensitive placeholders, it is not a level of encryption.
What is the significance of a backout plan in the change management process?
A. To identify the dependencies of the change.
B. To update the diagrams and policies/procedures.
C. To define the steps to revert to the original state if the change is unsuccessful.
D. To ensure that the change is reviewed and authorized by the appropriate stakeholders.
To define the steps to revert to the original state if the change is unsuccessful.
A backout plan defines the steps to revert to the original state if the change is unsuccessful. It is a critical part of the change management process as it ensures that the organization can quickly recover if the change has adverse effects.
What is the primary purpose of a Hardware Security Module (HSM)?
A. To replace sensitive data with non-sensitive placeholders.
B. To securely generate, store, and manage cryptographic keys.
C. To check the revocation status of digital certificates in real-time.
D. To hide data within other data.
To securely generate, store, and manage cryptographic keys.
A Hardware Security Module (HSM) is a physical device that securely generates, stores, and manages cryptographic keys. It provides a secure environment for performing cryptographic operations and is designed to be resistant to physical and logical attacks.
What is the purpose of data masking in cryptographic solutions?
A. To verify the integrity and authenticity of a digital message or document.
B. To protect sensitive data by replacing it with fake or pseudonymous data.
C. To establish a chain of trust to verify unknown public keys.
D. To increase the computational effort required to brute force a password.
To protect sensitive data by replacing it with fake or pseudonymous data.
Data masking is a method of protecting sensitive data by replacing it with fake or pseudonymous data. This is useful for testing and development environments where real data is needed but exposing the actual data is a security risk.
What is the purpose of a root of trust in cryptographic solutions?
A. To hide data within other data.
B. To securely store a copy of cryptographic keys.
C. To check the revocation status of digital certificates in real-time.
D. To establish a trusted starting point for the cryptographic operations of a system.
To establish a trusted starting point for the cryptographic operations of a system.
A root of trust is a secure area or component in a system that is trusted to perform the cryptographic operations of the system. It establishes a trusted starting point for the system’s security architecture and is used to verify the integrity and authenticity of the system and its components.
Which of the following is a characteristic of symmetric encryption?
A. It replaces sensitive data with non-sensitive placeholders.
B. The same key is used for both encryption and decryption.
C. It uses a pair of keys: a public key and a private key.
D. It is used to verify the integrity and authenticity of a digital message or document.
The same key is used for both encryption and decryption.
Symmetric encryption uses the same key for both encryption and decryption.
What best describes the motivations of a threat actor involved in causing chaos within an organization for personal vendetta?
A. Ethical
B. Revenge
C. Financial gain
D. Espionage
Revenge
Denotes a motive of retaliation, typically driven by feelings of anger or vendetta.
An attacker is using a malicious USB drive to compromise a target computer when plugged in. Which of the following best describes this type of attack vector?
A. Email
B. Removable device
C. Phishing
D. Voice call
Removable device
USB drives for example, are a hardware-related attack vector.
If an attacker is attempting to compromise an organization’s network by taking advantage of open wireless networks, which of the following best describes the attack surface?
A. Removable device
B. Bluetooth
C. Wired
D. Wireless
Wireless
An open wireless network represents a wireless attack surface.
An attacker sends a text message to a user, urging them to click on a malicious link. This type of attack is known as:
A. Smishing
B. Business email compromise
C. Vishing
D. Phishing
Smishing
Involves the use of SMS to deceive individuals.
A threat actor that operates on behalf of a government to steal information from other countries is best described as:
A. Hacktivist
B. Organized crime
C. Shadow IT
D. Nation-state
Nation-state
Actors operate on behalf of their governments and often have significant resources at their disposal.
When an attacker tricks an employee into revealing their password by pretending to be from the IT department, this tactic is called:
A. Misinformation
B. Impersonation
C. Brand impersonation
D. Pretexting
Pretexting
Involves creating a fabricated scenario or pretext to manipulate a target, which matches the described tactic.
An attacker registers a domain that looks visually similar to a legitimate domain by using characters from other scripts or slight misspellings. This kind of deception is known as:
A. Watering hole
B. Phishing
C. Pretexting
D. Punycode
Punycode
A method used to represent Unicode with the limited character subset of ASCII supported by the Domain Name System (DNS), and its abuse can lead to domain names that look similar to legitimate ones.
Which of the following best describes the concept of “microservices” in the context of architecture models?
A. Designing an application as a collection of loosely coupled, independently deployable services.
B. Dividing an application into tiny pieces where each piece is a separate OS.
C. Multiple physical servers combined to create a large compute cluster.
D. Offloading server management to cloud providers.
Designing an application as a collection of loosely coupled, independently deployable services.
Microservices architecture breaks down applications into small services that run in their own processes.
Which consideration involves understanding the potential dangers when a security solution stops working and defaults to a state where all traffic is allowed?
A. Cost-effectiveness
B. Responsiveness
C. Scalability
D. Fail-open
Fail-open
When a security device fails, it defaults to allowing traffic, which could be risky.
For which of the following scenarios would the use of a Jump Server be most appropriate?
A. To balance the load between multiple web servers.
B. To provide a controlled means of accessing another network segment.
C. To cache web content for faster access.
D. To scan incoming network traffic for malicious patterns.
To provide a controlled means of accessing another network segment.
Jump servers (or bastion hosts) are used to securely access and manage devices in a different security zone.
What does “containerization” primarily provide for application deployment?
A. An isolated environment to run and manage applications consistently across different stages.
B. A physical server environment to host applications.
C. Splitting applications into smaller services that can be developed independently.
D. Encrypting application data during transit.
An isolated environment to run and manage applications consistently across different stages.
Containers package an application with all of its dependencies to ensure it runs consistently in varied environments.
In terms of security architecture, why might an organization prefer a decentralized approach?
A. To make it easier to apply patches across the network.
B. To reduce the risk of a single point of failure and distribute resources.
C. To decrease the cost of deploying multiple data centers.
D. To ensure all data is stored in a single, central database.
To reduce the risk of a single point of failure and distribute resources.
Decentralized architectures distribute resources and functionalities, reducing risks associated with central points of failure.
Which protocol is primarily associated with port security and allows for network access control at the Data Link Layer?
A. IPSec
B. TLS
C. 802.1X
D. SD-WAN
802.1X
A standard for network access control at the Data Link Layer, often used in wired and wireless networks.