CompTIA Security+ Get Certified Get Ahead - CH9 Review Flashcards

1
Q

Employees access the data center by entering a cipher code at the door. However, everyone uses the same code, so it does not identify individuals. After a recent Security incident, management has decided to implement a key card system that will identify individuals who enter and exit this Secure area. However, the installation might take six months or longer. Which of the following choices can the organization install immediately to identify individuals who enter or exit the Secure area?

Access Control Vestibule
Access List
CCTV
Bollards
Compensating Control

A

CCTV (Closed-Circuit Television)

Explanation:
Closed-circuit television (CCTV) or a similar video surveillance system can monitor the entrance and record who enters and exits the area.

An access control vestibule (sometimes called a mantrap) prevents tailgating, but it doesn’t necessarily identify individuals.
An access list is useful if a guard identifies users and allows access based on the access list, but the access list does not identify users.
Bollards are a type of barricade that protects building entrances. Using a CCTV until the key card system is installed is an example of a compensating control, but all compensating controls do not identify people.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 876). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your local library is planning to purchase new laptops that patrons can use for Internet research. However, management is concerned about possible theft. Which of the following is the BEST choice to prevent theft of these laptops?

Mantrap
Anti-malware Software
Cable Locks
Disk Encryption

A

Cable Locks

Explanation:
A cable lock attaches to a computer and wraps around a piece of furniture to secure it to deter and prevent theft. This is like a bike lock used to secure a bicycle to a bike rack.

A mantrap prevents tailgating but is unrelated to this question.
Anti-malware software protects the systems from viruses and other malware.
Disk encryption is useful if the computers have confidential information, but it wouldn’t be appropriate to put confidential information on a public computer.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 876). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your organization needs to create a design from a high-security Network for a US government contract. The Network should not be accessible by your organization’s existing Networks or the Internet. Which of the following options will BEST meet this need?

Faraday Cage
Air Gap
Protected Cable Distribution
Vault

A

Air Gap

Explanation:
An air gap is a physical security control that ensures that a network is physically isolated from other networks, including the Internet.

A Faraday cage prevents radio frequency (RF) signals from entering or emanating beyond an enclosure, but a network within a Faraday cage can still be connected to external networks.
Protected cable distribution practices isolate cables from electromagnetic interference (EMI) sources but don’t isolate networks.
Vaults are rooms or large compartments used to store valuables, not isolate networks.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 877). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You need to Secure access to a data center. Which of the following choices provides the BEST physical Security to meet this need? (Choose THREE)

Biometrics
Cable Locks
Access Control Vestibule
CCTV
HVAC

A

Biometrics
Access Control Vestibule
CCTV

Explanation:
A biometric reader used for access control, an access control vestibule (sometimes called a mantrap), and a closed-circuit television (CCTV) system all provide strong physical security for accessing a data center.

Cable locks are effective theft deterrents for mobile devices such as laptops, but they don’t protect data centers.
Heating, ventilation, and air conditioning (HVAC) systems can control the data center’s environment, but they don’t secure access.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 877). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You need to add Disk Redundancy for a critical Server in your organization’s screened subnet. Management wants to ensure it supports two-drive failure. Which of the following is the BEST solution for this requirement?

RAID 0
RAID 1
RAID 5
RAID 6

A

RAID 6

Explanation:
A redundant array of independent disks 6 (RAID-6) is the best solution of the available answers. It supports two-drive failure meaning that two drives can fail in the RAID-6, and the disk subsystem will continue to operate.

RAID-0 (disk striping) doesn’t have any fault tolerance and will fail completely if a single drive fails.
RAID-1 (disk mirroring) uses only two drives. If one drive fails in a RAID-1, the data is preserved, but if two drives fail, all data is lost.
RAID-5 (striping with parity) will continue to operate if one drive fails, but all data is lost if two drives fail.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 877). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

** Your organization hosts several databases on two Servers. Management wants to increase the redundancy of data storage for these Servers. Which of the following is the BEST choice to meet this requirement?

NIC Teaming
Managed PDUs
UPS
Multipath

A

Multipath

Explanation:
Multipath is a fault-tolerance technique that provides more than one path for a system to the data storage system. It could be two Small Computer System System Interface (SCSI) controllers providing a path to SCSI disks, or two storage area network (SAN) switches providing redundant paths to a SAN.

Network interface card (NIC) teaming combines the bandwidth of two or more NICs to increase the throughput, but the NICs won’t necessarily be used to access disks.
Managed power distribution units (PDUs) provide the ability to monitor energy consumption in a data center remotely.
An uninterruptible power supply (UPS) provides short-term power to systems after a power failure.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 877-878). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization hosts an e-commerce Website that has been receiving a significant increase in traffic. The CPU is handling the load, but the Server is unable to process the bandwidth consistently. Which of the following is the BEST choice to solve this problem?

SAN
NIC Teaming
Multipath
Managed PDUs

A

NIC Teaming

Explanation:
Network interface card (NIC) teaming combines the bandwidth of two or more NICs to increase the throughput and would solve this problem.

A storage area network (SAN) is a computer network that provides block-level data storage. A SAN can increase disk performance, not bandwidth performance.
Multipath is a fault-tolerance technique used for data storage.
Managed power distribution units (PDUs) provide the ability to remotely monitor energy consumption in a data center.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 878). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

** Your organization is planning to deploy a new e-commerce Website. Management anticipates heavy processing requirements for a back-end application used by the Website. The current design will use one Web Server and multiple application Servers. Additionally, when beginning a session, a user will connect to an application Server and remain connected to the same application Server for the entire session. Which of the following BEST describes the configuration of the application Servers?

Load Balancing
Active/Active
Active/Passive
Persistence

A

Persistence

Explanation:
This describes a load-balancing configuration using persistence so that a user will connect to the same application server for an entire session. All the answers are related to load balancing, but the scenario describes load balancing with persistence, so persistence is more correct than load balancing.

An active/active load-balancing configuration indicates all the servers are handling user requests.
An active/passive load-balancing configuration has at least one server that is not actively serving clients but can take over if another server fails. However, the scenario didn’t give enough information to determine if the application servers were configured as active/active or active/passive.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 878). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

** Your organization recently implemented two Servers in an active/passive load-balancing configuration. What Security goal does this support?

Obfuscation
Integrity
Confidentiality
Resilience

A

Resilience

Explanation:
An active/passive load-balancing configuration supports resilience and high availability. An active/passive load-balancing configuration uses redundant servers to ensure a service continues to operate even if one of the servers fails.

Obfuscation methods attempt to make something unclear or difficult to understand and are not related to load balancing.
Integrity methods ensure that data has not been modified.
Confidentiality methods such as encryption prevent the unauthorized disclosure of data.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 879). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

** Your database backup strategy includes full backups performed on Saturdays at 12:01am and differential backups performed daily at 12:01am. If the database fails on Thursday afternoon, how many backups are required to restore it?

1
2
3
5

A

2

Explanation:
Two backups are required, the full backup performed on Sunday at 12:01 a.m. and the differential backup performed on Thursday at 12:01 a.m. If you perform only one backup, it would be the full backup. You can’t restore a differential backup without restoring the full backup first. This wouldn’t include all the changes that occurred during the week. If you were using a full/incremental strategy, you would apply five backups: the full backup, and each of the incremental backups performed daily (Monday, Tuesday, Wednesday, and Thursday).

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 879). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After reading about increased ransomware attacks against the health sector, hospital administrators want to enhance organizational resilience against these attacks. Which of the following could IT personnel implement to support this goal?

Use email filtering to block malicious emails.
Perform regular testing and validation of full backups.
Ensure all systems are patched.
Increase end-user training related to ransomware and other risks.

A

Perform regular testing and validation of full backups.

Explanation:
Performing regular testing and validation of full backups will enhance organizational resilience against ransomware attacks. Resiliency techniques help ensure an organization can recover from a security incident and minimize downtime after an outage. The other answers all refer to preventive methods taken before an outage.

Email filtering blocks spam and malicious emails can prevent ransomware attacks.
Keeping systems patched helps ensure they aren’t susceptible to known vulnerabilities.
Training users decreases the possibility that they may respond inappropriately to malicious emails.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 879). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your organization hired a Security consultant to create a BIA. She is trying to identify processes that can potentially cause losses in revenue if they stop functioning. Which of the following BEST describes what she is identifying?

Single points of failure.
Critical systems.
Mission-essential functions
MTBF

A

Mission-essential functions

Explanation:
The security consultant is identifying mission-essential functions, which is a key part of a business impact analysis (BIA).

A single point of failure is a component within a system that can cause the entire system to fail if the component fails. It’s common to eliminate single points of failure of critical systems, but not all single points of failure are supporting mission-essential functions.
Critical systems support mission-essential functions. However, if single points of failure have been eliminated, a critical system can fail but the mission-essential function will continue to operate.
The mean time between failures (MTBF) identifies the average (the arithmetic mean) time between failures.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 879-880). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After a recent attack causing a data breach, an executive is analyzing the financial losses. She determined that the attack is likely to result in losses of atleast $1 million. She wants to ensure that this information is documented for future planning purposes. Which of the following documents is she MOST likely to use?

DRP
BIA
MTTR
RTO

A

BIA (Business Impact Analysis)

Explanation:
A business impact analysis (BIA) includes information on potential losses and is the most likely document of those listed where this loss would be documented.

A disaster recovery plan (DRP) includes methods used to recover from an outage.
The mean time to repair (MTTR) identifies the average (the arithmetic mean) time it takes to restore a failed system.
The recovery time objective (RTO) identifies the maximum amount of time it should take to restore a system after an outage.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 880). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Project Manager is reviewing a business impact analysis. It indicates that a key website can tolerate a maximum of three hours of downtime. Administrators have identified several Systems that require redundancy additions to meet this maximum downtime requirement. Of the following choices, what term refers to the maximum of three hours of downtime?

RPO
MTTR
MTBF
RTO
DRP

A

RTO (Recovery Time Objective)

Explanation:
The recovery time objective (RTO) identifies the maximum amount of time it can take to restore a system after an outage. Because the business impact analysis states that the website can only tolerate three hours of downtime, this also identifies the RTO.

The recovery point objective (RPO) identifies a point in time where data loss is acceptable, but it doesn’t refer to downtime.
The mean time to recover (MTTR) metric identifies the average (the arithmetic mean) time it takes to restore a failed system, but not a maximum amount of time a system can be down.
The mean time between failures (MTBF) metric provides a measure of a system’s reliability and is usually represented in hours.
A disaster recovery plan (DRP) details the recovery steps to take after different types of disasters.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 880). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Lisa has sscheduled a quarterly meeting with department leaders to discuss how they would respond to various scenarios such as natural disasters or cyberattacks. During the meeting, she presents a scenario and asks attendees to indicate their responses. Also, during the meetings, she injects variations on the scenario similar to what may happen during a live event and encourages attendees to discuss their responses. What does this describe?

Simulation
Tabletop Exercise
Incident Response
Testing Site Resiliency

A

Tabletop Exercise

Explanation:
This is a tabletop exercise. A tabletop exercise is discussion-based, and participants discuss their responses to various scenarios.

A simulation is a hands-on exercise, not a meeting.
Incident response refers to the actual steps taken in response to an incident (preparation, identification, containment, eradication, recovery, lessons learned), not a meeting discussing steps to take.
Site resiliency is tested by seeing if an alternate site (such as a hot site, cold site, or warm site) can take over if necessary, but the scenario doesn’t discuss alternate sites.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 880-881). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are a technician at a small organization. You need t oadd fault-tolerance capabilities within the business to increase the availability of data. However, you need to keep costs as low as possible. Which of the following is the BEST choice to meet these needs?

Alternate processing site.
RAID 10
Backups
Faraday Cage

A

RAID 10

Explanation:
A redundant array of inexpensive disks 10 (RAID-10) subsystem provides fault tolerance for disks and increases data availability.

An alternate processing site might be used for a mission-essential function, but it is expensive and does much more than increase the availability of data.
Backups help ensure data availability, but they do not help with fault tolerance.
A Faraday cage is a room or enclosure that prevents signals from emanating beyond the room.

17
Q

Flancrest Enterprises recently set up a website utilizing several web Servers in a web farm. The web Servers access a back-end database. The database is hosted by a database application configured on two database Servers. Web Servers can access either of the database Servers. Which of the following BEST describes the configuration of the database Servers?

Active-Passive
Round-Robin
Affinity
Active-Active

A

Active-Active

Explanation:
The database servers are in an active-active load-balancing configuration because web servers can query both database servers.

In an active-passive configuration, only one of the database servers would be answering queries at any given time.
Round-robin and affinity are two methods of scheduling the load balancing in an active-active configuration.

18
Q

Lisa is a new Chief Technology Officer (CTO) at your organization. She wants to ensure that critical business systems are protected from isolated outages. Which of the following would let her know how often these systems will experience outages?

MTTR
MTBF
RTO
RPO

A

MTBF (Mean Time Between Failutres)

Explanation:
The mean time between failures (MTBF) provides a measure of a systems reliability and would provide an estimate of how often the systems will experience outages.

The mean time to recover (MTTR) refers to the time it takes to restore a system, not the time between failures.
The recovery time objective (RTO) identifies the maximum amount of time it can take to restore a system after an outage.
The recovery point objective (RPO) identifies a point in time where data loss is acceptable.

19
Q

Your organization has decided to increase the amount of customer data it maintains and use it for targeted sales. However, management is concerned that they will need to comply with existing laws related to PII. Which of the following should be completed to determine if the customer data is PII?

Privacy Threshold Assessment
Privacy Impact Assessment
Tabletop Exercise
Affinity Scheduling

A

Privacy Threshold Assessment

Explanation:
A privacy threshold assessment helps an organization identify Personally Identifiable Information (PII) within a system, and in this scenario, it would help the organization determine if the customer data is PII.

A privacy impact assessment is done after you have verified that the system is processing PII, not to determine if the data is PII.
A tabletop exercise is a discussion-based exercise used to talk through a continuity of operations plan.
Affinity scheduling is a load-balancing scheduling scheme using the clients IP address and is unrelated to PII.

20
Q

After a recent attack on your organization’s Network, the CTO is insisting that the DMZ uses two Firewalls and they are purchased from different companies. Which of the following BEST describes this practice?

Single-Layer Security
Vendor Diversity
Control Diversity
Redundancy

A

Vendor Diversity

Explanation:
The chief technology officer (CTO) is recommending vendor diversity for the demilitarized zone (DMZ). Firewalls from different companies (vendors) provide vendor diversity.

This also provides defense in depth or layered security, but not single-layer security.
Control diversity is the use of different controls such as technical, administrative, and physical.
Redundancy is the use of duplicate components for fault tolerance, but the two firewalls work together in the DMZ.