CompTIA Security+ (SY0-701) Exam 2 Revision Flashcards

1
Q

When deploying a new NIDS in an enterprise environment, where is the most effective placement considering typical network architecture?

Inline between the wireless access point and the endpoint devices.

Directly on the endpoint devices.

Inline between the internal network and the internet gateway.

On a mirrored port from the core switch.

A

The correct placement is on a mirrored port from the core switch because it allows the NIDS to monitor all network traffic without impacting the traffic flow. Placing it directly on endpoint devices would not provide visibility across the network and could degrade performance on the endpoints. Placing it inline, whether between the internal network and the gateway or between the access point and endpoints, would provide visibility but at the risk of creating a single point of failure and potentially degrading network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most effective measure to protect against attacks exploiting unsecured wired network connections?

Use VPNs for all data transmitted over the network.

Implement MAC address filtering on the network.

Encrypt data at rest using strong encryption standards.

Physically secure network ports and infrastructure.

A

Physically securing network ports and infrastructure is the most effective measure against attacks exploiting unsecured wired network connections. While VPNs, MAC address filtering, and data encryption are important security measures, they do not address the direct risk of someone physically connecting to the network through unsecured ports. Physical security controls such as locking network rooms and securing network ports are essential to prevent unauthorized physical access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company needs to ensure that only authorized employees can access its critical infrastructure data. Which method would be most effective in achieving this goal?

Obfuscation

Permission restrictions

Segmentation

Encryption

A

Segmentation involves dividing a network into smaller segments to control the flow of traffic and restrict access. This method is particularly effective for securing critical infrastructure data by limiting access to authorized personnel only. Encryption, permission restrictions, and obfuscation may complement segmentation but are not as directly related to controlling access to critical infrastructure data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAF

A

Web application firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is key stretching?

A

Key stretching is the technique that should be implemented to enhance the security of stored passwords, especially in the face of brute-force attack risks. This method involves applying a hashing function multiple times or using a cryptographic algorithm to make the hashing process computationally more demanding. By doing so, it significantly increases the time and effort required to crack each password, even if the attacker has access to the hashed passwords. Unlike digital signatures or certificates, which are used for verifying integrity and establishing secure connections, or blockchain, which is used for decentralized record-keeping, key stretching specifically targets the enhancement of password security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Ephemeral Credentials?

A

Ephemeral credentials offer a secure way to provide developers with temporary access to production environments as needed, automatically expiring after a set period or task completion. This method minimizes security risks by limiting the duration of access and reducing the potential for credentials misuse or theft. Permanent access, shared credentials, and solely relying on manual approvals can lead to security gaps, such as unauthorized access or inefficient access management processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Password Vaulting?

A

Password vaulting is a security practice where privileged passwords are stored securely and accessed by users when needed, often involving an additional layer of authentication to access the vault. This approach minimizes risks by ensuring that privileged credentials are not overexposed and are only available to authorized users on an as-needed basis, reducing the attack surface for potential credential theft. Assigning permanent admin rights, using a single shared account, and merely requiring complex passwords do not effectively minimize the risks associated with privileged account management as they either overexpose credentials or fail to address the root issue of credential management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method can you use to to mitigate SQL Injections and XSS?

A

Both SQL injection and XSS attacks exploit vulnerabilities that arise from improper handling of user input. By validating (ensuring input meets specific criteria) and sanitizing (removing or encoding dangerous characters) all user inputs, an application can significantly reduce the risk of these attacks. While CSP headers can help mitigate the impact of XSS attacks by restricting resources the browser can load, and while file permissions and security testing are important, they do not address the core issue of malicious user input directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of Steganography?

A

Steganography is the technique that should be used to conceal a message within an email, making it undetectable to unauthorized viewers. It involves hiding data within other data, such as embedding a text message within an image or another file type, in a way that makes the hidden data not apparent to the observer. This method is ideal for enhancing the privacy of email messages by ensuring that only intended recipients know of the existence and how to access the concealed message. Unlike tokenization or data masking, which replace or obscure data for protection, steganography uniquely hides the existence of the data itself. Secure Enclaves provide secure storage and processing environments but do not relate to the method of concealing data within communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you limit access to external contractors access to sensitive information?

A

Implementing network segmentation is the most effective way to limit the access of external contractors to only those parts of the network necessary for their work. This minimizes the risk of unauthorized access to sensitive information and systems. While enforcing multi-factor authentication adds a layer of security, segmentation directly addresses the problem by controlling access more granitely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you check revocation list in real time?

A

The Online Certificate Status Protocol (OCSP) is the most efficient mechanism for an organization to ensure browsers and clients are immediately aware that a compromised certificate is no longer valid. OCSP allows browsers and clients to check the revocation status of certificates in real-time, providing quicker and more efficient verification compared to Certificate Revocation Lists (CRLs), which require downloading a list that may not be immediately updated. While Secure Enclaves and Blockchain provide security in different contexts, OCSP directly addresses the need for timely notification of certificate revocation to maintain secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a replay attack?

A

Replay attacks involve the malicious or fraudulent repeat of a valid data transmission. This is different from buffer overflow, injection, or privilege escalation, as it specifically relates to the unauthorized retransmission of data, not code execution or elevation of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ALE?

A

Estimating the Annualized Loss Expectancy (ALE) for unauthorized access incidents provides the most accurate assessment of the potential financial impact by combining the frequency of the event occurring within a year (ARO) with the financial impact of each occurrence (SLE). This method offers a clear financial metric that helps in decision-making and prioritization of mitigation strategies. While conducting risk assessments and analyzing probability and impact are crucial, ALE provides a specific financial perspective crucial for financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DAC?

A

In Discretionary Access Control (DAC), the access rights are at the discretion of the data or resource owner, allowing them to decide who gets access. This contrasts with MAC, where access is determined by system-enforced policies, RBAC, which is based on roles, and ABAC, which uses attributes for decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a credential replay attack?

A

A credential replay attack involves an attacker capturing and reusing credentials to gain unauthorized access. The pattern of multiple unsuccessful logins from various locations suggests that stolen credentials are being tested. This is not characteristic of an on-path attack, which involves intercepting data; a DDoS attack, which aims to overwhelm systems with traffic; or a wireless attack, which targets wireless network vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is password spraying attack?

A

Password spraying attacks involve attempting a small number of common passwords against a large number of accounts to avoid account lockouts that would typically occur with brute force attacks. Unlike buffer overflow, replay, or privilege escalation attacks, spraying targets weaknesses in password policies and is characterized by multiple login attempts from different IPs.

17
Q

What is a privilege escalation attack?

A

Privilege escalation occurs when an attacker gains unauthorized access to a system’s functions or data beyond their initial permissions. Unlike replay, injection, or directory traversal attacks, privilege escalation directly increases an attacker’s access level within the compromised system.

18
Q

What is a directory traversal attack?

A

A Traversal Attack (often referred to as Directory Traversal or Path Traversal attack) is a type of security vulnerability where an attacker manipulates file paths in an application to gain unauthorized access to files and directories outside the intended scope. This attack exploits improper handling of file paths, allowing an attacker to navigate through the filesystem and access files that should be restricted.

Example: An attacker might use sequences like ../ (parent directory) to navigate up the directory structure.