CompTIA Security+ Certification Exam SY0-701 Practice Test 17 Flashcards

1
Q

Which of the following statements describe the features of dynamic code analysis? (Select 3 answers)

A) Typically used later in the software development lifecycle

B) Involves examining the code without executing it

C) Analyzes runtime properties like memory usage, performance, and error handling to identify issues such as memory leaks, performance bottlenecks, and runtime errors

D) Often used early in the development process

E) Examines code structure, syntax, and semantics to detect issues like syntax errors, coding standards violations, security vulnerabilities, and bugs

F) Involves executing the code and analyzing its behavior at runtime

A

A) Typically used later in the software development lifecycle

C) Analyzes runtime properties like memory usage, performance, and error handling to identify issues such as memory leaks, performance bottlenecks, and runtime errors

F) Involves executing the code and analyzing its behavior at runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the terms listed below refers to tracking and managing software application components, such as third-party libraries and other dependencies?

A) Version control
B) Package monitoring
C) Configuration enforcement
D) Application hardening

A

B) Package monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the terms listed below refers to a US government initiative for real-time sharing of cyber threat indicators?

A) AIS
B) STIX
C) TTP
D) CVSS

A

A) AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following terms refers to threat intelligence gathered from publicly available sources?

A) IoC
B) OSINT
C) RFC
D) CVE/NVD

A

B) OSINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is STIX?

A) A type of vulnerability database
B) Common language for describing cyber threat information

C) US government initiative for real-time sharing of cyber threat indicators

D) Transport mechanism for cyber threat information

A

B) Common language for describing cyber threat information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A dedicated transport mechanism for cyber threat information is called:

A) TCP/IP
B) TLS
C) TAXII
D)

A

C) TAXII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements does not apply to dark web?

A) Typically requires specialized software to access its contents
B) Forms a large part of the deep web
C) Not indexed by traditional search engines
D) Often associated with trading stolen data, malware, and cyber threats

A

B) Forms a large part of the deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following provides insights into the methods and tools used by cybercriminals to carry out attacks?

A) CVE
B) IoC
C) AIS
D) TTP

A

D) TTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing: (Select all that apply)

A) Bypasses security controls
B) Only identifies lack of security controls
C) Actively tests security controls
D) Exploits vulnerabilities
E) Passively tests security controls

A

A) Bypasses security controls
C) Actively tests security controls
D) Exploits vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A responsible disclosure program is a formal process established by an organization to encourage security researchers and ethical hackers to report vulnerabilities they discover in the organization’s systems or software. A bug bounty program is a specific type of responsible disclosure program that offers financial rewards to security researchers for reporting valid vulnerabilities.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

A) Fault tolerance
B) False positive error
C) Quarantine feature
D) False negative error

A

B) False positive error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to a situation where no alarm is raised when an attack has taken place?

A) False negative
B) True positive
C) False positive
D) True negative

A

A) False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A measure of the likelihood that a security system will incorrectly reject an access attempt by an authorized user is referred to as:

A) FAR
B) CER
C) CRC
D) FRR

A

D) FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following terms refers to a framework and knowledge base that provides understanding of TTPs used during cyberattacks?

A) CVSS
B) ATT&CK
C) STIX
D) TAXII

A

B) ATT&CK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to an industry standard for assessing and scoring the severity of computer system security vulnerabilities?

A) SIEM
B) CVSS
C) OSINT
D) SOAR

A

B) CVSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?

A) TAXII
B) CVE
C) STIX
D) CVSS

A

B) CVE

16
Q

What is Exposure Factor (EF) in vulnerability analysis?

A) The likelihood that a vulnerability will be exploited in a real-world scenario

B) The rate at which vulnerabilities are discovered and reported

C) The degree of loss that a realized threat would have on a specific asset

D) The measure of the potential impact of a vulnerability on an organization’s assets

A

C) The degree of loss that a realized threat would have on a specific asset

17
Q

Which of the statements listed below does not refer to a vulnerability response and remediation technique?

A) Applying updates or fixes provided by software vendors to address the vulnerability (patching)

B) Ensuring financial recovery from the costs associated with a successful cyberattack (insurance)

C) Dividing a network into smaller, isolated zones to limit the potential impact of a vulnerability (segmentation)

D) Mitigating the risk associated with a vulnerability that cannot be immediately patched by implementing alternative security measures (compensating controls)

E) Delaying or forgoing a patch for a specific system, e.g., when applying a patch may not be feasible due to compatibility issues or potential disruptions to critical systems (exceptions and exemptions)

F) All of the above answers are examples of vulnerability response and remediation techniques

A

F) All of the above answers are examples of vulnerability response and remediation techniques

18
Q

The practice of isolating potentially malicious or suspicious entities to prevent them from causing harm to the rest of the network or system is known as:

A) Sandboxing
B) Containerization
C) Quarantine
D) Segmentation

A

C) Quarantine

19
Q

Which of the following answers refer to SCAP? (Select 3 answers)

A) A type of security system designed to collect logs and events from various sources

B) Designed to provide a centralized user interface for accessing collected data

C) A collection of standards developed by NIST

D) Provides a common language for communicating security information

E) Allows different security tools to share data and work together more effectively

F) Enables real-time threat detection, incident response, and compliance monitoring

A

C) A collection of standards developed by NIST

D) Provides a common language for communicating security information

E) Allows different security tools to share data and work together more effectively

20
Q

Which of the answers listed below refer to SIEM? (Select 3 answers)

A) Allows different security tools to share data and work together more effectively

B) Designed to provide a centralized user interface for accessing collected data

C) A collection of standards developed by NIST

D) Enables real-time threat detection, incident response, and compliance monitoring

E) A type of security system designed to collect logs and events from various sources

F) Provides a common language for communicating security information

A

B) Designed to provide a centralized user interface for accessing collected data

D) Enables real-time threat detection, incident response, and compliance monitoring

E) A type of security system designed to collect logs and events from various sources

21
Q

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?

A) IPS
B) DLP
C) IDS
D) DEP

A

B) DLP

22
Q

Simple Network Management Protocol (SNMP) is a UDP-based, application layer protocol used in network management systems to monitor network-attached devices. SNMP is typically integrated into most modern network infrastructure devices such as routers, bridges, switches, servers, printers, copiers, fax machines, and other network-attached devices. An SNMP-managed network comprises three essential components: a managed device, a network-management software module that resides on a managed device (Agent), and a Network Management Station (NMS), which runs applications responsible for monitoring and controlling managed devices, as well as collecting SNMP information from Agents. The manager receives notifications (Traps and InformRequests) on UDP port 162, while the SNMP Agent receives requests on UDP port 161.

A) True
B) False

A

A) True

23
Q

An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as:

A) MIB
B) DCS
C) NMS
D) SIEM

A

A) MIB

24
Q

Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (a.k.a. cleartext). SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit.

A) True
B) False

A

A) True