CompTIA Security+ Certification SYO-701 Exam Questions Flashcards
What principle of social engineering is the natural gas utility seeking to utilize by sending messages, similar to the one provided, to encourage customers to reduce their energy consumption?
A: Consensus
B: Familiarity
C: Intimidation
D: Authority
** Answer: Consensus **
Consensus in security is a process that uses automated verification to establish agreement, trust, and security across a network. It’s used in blockchains, cryptocurrencies, and distributed ledgers.
An attacker captures a legitimate user’s request to an application and then sends it multiple times. What type of application security threat does this scenario represent?
A: Memory leak
B: Replay attack
C: Integer overflow
D: Request forgeries
** Answer: Replay Attack **
It is a malicious act where a hacker intercepts a legitimate data transmission and then re-transmits it at a later time, essentially “replaying” the data to trick a system into performing an unauthorized action, like granting access or processing a transaction, as if the original request was being made again; this exploits a lack of proper authentication mechanisms in the communication protocol involved.
A replay attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution.
While modifying security protocols to adapt to evolving threats, what control category best characterizes the network firewall Bob is managing?
A: Corrective
B: Preventative
C: Deterrent
D: Detective
** Answer: B: Preventative **
Examples of preventative security:
Firewalls: Filter network traffic to prevent unauthorized access
Encryption: Secures data during storage and transmission
Antivirus software: Scans for malicious software and protects devices from infection
Software updates: Keeps software up to date to fix vulnerabilities
System hardening: Strengthens systems to make them more difficult to attack
User access controls: Limits who can access systems and data
Network access controls: Limits who can access networks
Security awareness training: Educates users on how to identify and avoid security threats
Policies and procedures: Establishes guidelines for how to respond to security threats
Within a PKI system, a Registration Authority (RA) plays a vital role. What’s the main responsibility of an RA?
A: Conducting encryption operations
B: Establishing secure connections
C: Managing certificate registrations
D: Issuing root certificates
** Answer: Managing certificate registrations**
A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
Some attacks aim to gain higher privileges on a mobile device. Which of the following options is an example of such a privilege escalation attack?
A: Jailbreaking
B: Tethering
C: Man-in-the-middle
D: Sideloading
** Answer: Jailbreaking **
Jailbreaking is a technique that bypasses restrictions on a device or application to gain more control or access to unauthorized software. It can be used on mobile devices, AI models, and other applications.
Amanda wants to create a secure connection between two company offices using IPsec-based VPN concentrators. Which IPsec mode is BEST suited for this site-to-site VPN setup?
A: Split tunnel
B: TLS
C: Transport model
D: Tunnel model
** Answer: Tunnel Model **
For a site-to-site VPN setup using IPsec concentrators, the best mode is “Tunnel Mode” as it encapsulates the entire original packet, providing the most secure and reliable connection between the two offices.
A military base recently deployed large, loud dogs that bark fiercely at any movement. What type of security control does this represent?
A: Detective
B: Compensating
C: Preventive
D: Deterrent
** Answer: Deterrent **
A deterrent control refers to a security measure designed to discourage individuals from violating security controls. It can take various forms, such as signs indicating video monitoring or yard signs with alarm company logos, which signal the presence of other security measures.
When assessing a vendor, what is the main goal of penetration testing?
A: To identify vulnerabilities in the vendor’s systems and applications
B: To evaluate the vendor’s marketing strategies
C: To evaluate the vendor’s financial stability
D: To assess the physical security of the vendor’s premises
** Answer: A **
The primary goal of penetration testing in security is to proactively identify vulnerabilities within a system or network that malicious actors could exploit, allowing organizations to address weaknesses and improve their overall security posture before a real attack occurs; essentially, it’s a simulated attack to discover potential security flaws
Imagine you need to connect to your company’s network remotely and manage files or applications securely. Which protocol facilitates this secure remote access?
A: Simple Network Management Protocol (SNMP)
B: Secure Shell (SSH)
C: Simple Mail Transfer Protocol (SMTP)
D: File Transfer Protocol (FTP)
** Answer: Secure Shell (SSH) **
Amanda is building an incident response team. Who, among the following, should HOLD ultimate responsibility and authority over the team’s actions?
A: Chief Financial Officer (CFO)
B: Chief Information Officer (CIO)
C: Chief Executive Officer (CEO)
D: Chief Information Security Officer (CISO)
** Answer: Chief Information Security Officer (CISO) **
CISO security is the role of a Chief Information Security Officer (CISO) in protecting an organization’s information and technology assets. CISOs are senior executives who work with IT managers, business leaders, and security teams to ensure the security of an organization’s systems, applications, and data.
What security tool acts as a gatekeeper, inspecting and filtering incoming and outgoing network traffic based on defined security policies to block unauthorized access?
A: Virtual Private Network (VPN)
B: Intrusion Detection System (IDS)
C: Network Address Translation (NAT)
D: Access Control Lists (ACL)
** Answer: Access Control Lists (ACL) **
An access control list (ACL) is a set of rules that control who can access a network or computer system. ACLs are a key component of network security, and are used to protect sensitive data and resources.
In cryptography, Kerckhoff’s principle focuses on the importance of secrecy for which element?
A: Public disclosure of encryption methods
B: Keeping the key confidential
C: Regularly changing encryption algorithms
D: Keeping the algorithm secret
** Answer: Keeping the key confidential **
Kerckhoff’s Principle is a fundamental concept in cryptography that states that a system’s security should rely on the secrecy of its keys, not the secrecy of the system itself.
Kerckhoffs’ principle is a fundamental concept in cryptography. It states that the security of a cryptographic system shouldn’t rely on the secrecy of the algorithm. Instead, it should be based on the secrecy of the cryptographic key. A good cryptographic system should remain secure even if the algorithm used is known.
Amanda wants to prevent employees from stealing confidential data. Which control would be LEAST helpful?
A: Implementing data loss prevention systems
B: Blocking the use of personal email accounts
C: Building least privilege access controls
D: Encrypting data in transit
** Answer: Encrypting data in transit **
What ethical hacking practice led to Bob receiving a $10,000 payout from Microsoft for identifying a security flaw in their NET platform?
A: Red-team
B: Black Hat
C: Bug bounty
D: OSINT
** Answer: OSINT **
Open Source Intelligence (OSINT) is the process of collecting and analyzing publicly available information to support security and intelligence operations. In the context of security, OSINT can be used to identify potential threats and vulnerabilities.
Which technology is used to combat malware and phishing attacks propagated through email platforms?
A:Intrusion Prevention System (IPS)
B: Email gateway
C: Virtual Private Network (VPN)
D: Secure Sockets Layer (SSL)
** Answer: Email gateway **
It refers to a dedicated server that acts as a checkpoint for all incoming and outgoing emails, inspecting them for potential threats like malware, spam, phishing attempts, and other malicious content before delivering them to the intended recipient, essentially acting as a security filter to protect an organization’s email system; a “secure email gateway” (SEG) specifically indicates a system designed to perform this function with advanced threat detection capabilities.
Which approach to access control determines permissions based on established policies rather than individual user identities?
A: Implicit Trust Zones
B: Policy-driven Access Control
C: Zero Trust
D: Adaptive Identity
** Answer: Policy-driven Access Control **
“Policy-driven Access Control” in security refers to a method of managing user access to systems and resources based on predefined policies, where access decisions are made by evaluating a user’s attributes against these policies, allowing for more granular control and dynamic adjustments compared to simpler role-based access control (RBAC) models; essentially, it means users can only access information or perform actions that are explicitly permitted by the established policies within the system.
Bob wants to deploy a Cloud Access Security Broker (CASB) for his organization. To ensure compatibility with most cloud applications, what approach should he prioritize?
A: Forward proxy
B: Firewall
C: Extensive Reporting Functionalities
D: API
** Answer: Forward proxy **
Forward proxies add an extra layer of security between your network and the Internet. They can be configured to block access to malicious websites, reducing the risk of malware infections.
A proxy server, sometimes referred to as a forward proxy, is a server that routes traffic between client(s) and another system, usually external to the network. By doing so, it can regulate traffic according to preset policies, convert and mask client IP addresses, enforce security protocols, and block unknown traffic
In order to protect her SMTP email exchanges from eavesdropping during transmission, what solutions can Stephani implement?
A: SPF
B: DKIM
C: EXIF
D: TLS
** Answer: TLS **
TLS (Transport Layer Security) protects SMTP emails by encrypting the communication between email servers during transmission, ensuring that the content of the email remains confidential and cannot be intercepted or read by unauthorized parties while it travels across the internet; essentially making email transmission more secure by preventing eavesdropping on the data exchanged between servers.
The Chief Information Security Officer aims to guarantee the validation and integrity verification of zone transfers within the organization. Which solution among the following is the most appropriate?
A: LDAPS
B: DNSSEC
C: DLP
D: NGFW
** Answer: DNSSEC **
Domain Name System Security Extensions (DNSSEC) is a set of protocols that use cryptography to improve the security of the Domain Name System (DNS). DNSSEC helps protect users from receiving incorrect or tampered data, and it can help prevent cyber attacks.
Amanda is beginning a penetration test against a client and would like to begin with passive reconnaissance. Which one of the following tools may be used for passive reconnaissance?
A: Social engineering tools
B: Metasploit
C: Nslookup
D: Nessus
** Answer: Nslookup **
Nslookup is a command-line tool that can be used to investigate security breaches and troubleshoot network issues. It can be used on Windows and Unix operating systems.
Security uses
– Phishing detection: Nslookup can help detect phishing attacks by identifying IP addresses associated with malicious domains.
– DDoS attack tracking: Nslookup can help identify the IP addresses of attackers in a DDoS attack.
– Cache poisoning defense: Nslookup can help detect cache poisoning attacks, where attackers distribute fraudulent data to DNS servers.
Which type of card would be the most suitable choice for Bob’s facility, given his primary concern about authentication speed in a card-based access control system?
A: Magnetic stripe card
B: Proximity card
C: Photo ID card
D: Smart card
** Answer: B: Proximity card **
A proximity card is a contactless card or key fob which is used to access secure areas. They are a key part of modern access control systems.
Among the following options, which certificate format is likely employed in the displayed certificate?
A: P12
B: PEM
C: DER
D: PFX
** Answer: B: PEM **
PEM can refer to Preemptive Exposure Management, Privileged Entitlements Management, or Privacy Enhanced Mail, which are all cybersecurity-related terms.
– A proactive cybersecurity strategy that identifies and fixes security vulnerabilities before they can be exploited.
– Uses technologies like automated security control assessments and breach and attack simulation.
Which algorithm did the US federal government sanction for digital signature creation as per the Digital Signature Standard (DSS)?
A: DSA
B: 3DES
C: RSA
D: AES
** Answer: A: DSA **
Digital Signature Algorithm (DSA)
– A public-key cryptosystem that uses a mathematical concept to create digital signatures.
– The DSA was proposed by the National Institute of Standards and Technology (NIST) in 1991 and adopted by the Federal Information Processing Standard (FIPS) in 1993.
– A DSA certificate makes it easier to keep up with government standards.
Which subnet would be most suitable for a security administrator to create on a corporate firewall interface for establishing a DMZ, with the capacity to host up to 14 physical hosts?
A: 192.168.0.16/28
B: 192.168.0.16 - 255.25.255.248
C: 192.168.1.50 - 255.255.25.240
D: 192.168.2.32/27
** Answer: A: 192.168.0.16/28 **
A DMZ subnet typically hosts servers that need to be accessible from the public internet, like web servers, email servers, DNS servers, FTP servers, VPN gateways, proxy servers, firewalls, load balancers, application servers, database servers (if publicly accessible), content management systems (CMS), e-commerce platforms, remote access servers, and public-facing collaboration tools; all of which should be carefully configured and monitored due to their exposure to external threat