CompTIA Security+ (SY0-701) Exam 3 Revision Flashcards

1
Q

A user notices an advertisement for a popular software at a significantly reduced price on a new website. After purchasing the software, they receive a download link that installs malware on their computer. This incident is an example of what kind of attack?

Typosquatting

Pretexting

Watering hole

Brand impersonation

A

This situation illustrates brand impersonation, where attackers create fake advertisements or websites that mimic legitimate products or services to deceive users. In this case, the attackers used the reputation of popular software to lure individuals into purchasing from a malicious website, leading to malware installation. Unlike a watering hole attack, which targets users through compromised websites they normally visit, pretexting, which involves creating a false scenario, or typosquatting, which focuses on domain name misspellings, brand impersonation directly exploits the trust in a well-known brand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For hardening a company’s mobile devices, what is the most effective strategy?

Installing a third-party app store

Disabling Bluetooth and NFC.

Implementing a MDM solution.

Enforcing screen lock with biometrics

A

Implementing a Mobile Device Management (MDM) solution provides comprehensive control over mobile devices, allowing for the enforcement of security policies, application management, and remote wiping capabilities. While enforcing screen locks with biometrics and disabling Bluetooth and NFC can improve security, these measures are less comprehensive than an MDM solution. Installing a third-party app store could introduce security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a significant security concern when using decentralized networks, such as blockchain, compared to centralized networks?

Decentralized networks inherently offer less data privacy.

Centralized networks are easier to update with new security measures.

The immutability of transactions can lead to irreversible data breaches.

They require more energy to operate efficiently.

A

A significant security concern when using decentralized networks, like blockchain, is the immutability of transactions. Once data has been recorded in a decentralized system, it cannot be altered or erased. This feature, while providing transparency and security against tampering, also means that if sensitive data is inadvertently or maliciously entered into the blockchain, it becomes permanently accessible, leading to potential privacy issues and irreversible data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary advantage of offsite backups compared to onsite backups in disaster recovery planning?

Lower costs

Immediate accessibility

Higher data transfer speeds

Protection from local disasters

A

Offsite backups offer protection from local disasters affecting the primary site, unlike onsite backups which are vulnerable to the same physical threats, making them a key component of comprehensive disaster recovery planning, despite potentially higher costs and lower data transfer speeds compared to local backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of a WO in managing ongoing vendor services?

To provide ongoing authorization for routine services and define specific tasks

To establish the overall strategic direction of the partnership

To serve as a formal record of completed work for billing purposes only

To act as a binding agreement for a single, one-off project

A

The role of a Work Order (WO) in managing ongoing vendor services is to provide ongoing authorization for routine services and define specific tasks, deliverables, timelines, and sometimes the payment for those services. WOs are crucial for managing and documenting the specifics of each task or project within the framework of a broader agreement, ensuring clarity and accountability on deliverables. Unlike serving merely as a billing record or a strategic document, WOs focus on the operational aspects of the vendor-client relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker exploits a vulnerability in a smartphone’s operating system that allows them to remotely install spyware without the user’s knowledge. This attack is an example of what kind of vulnerability?

Misconfiguration

Mobile device

Zero-day

Firmware

A

This situation likely involves a zero-day vulnerability within the smartphone’s operating system, which was previously unknown and therefore unpatched by the time of the attack. While it affects a mobile device, the term “mobile device” is too broad and does not specify the nature of the vulnerability; misconfiguration implies incorrect settings by the user; and firmware typically refers to lower-level software, not necessarily the entire operating system. Zero-day vulnerabilities represent a unique category where the exploit occurs before the vulnerability is known to the software developers or the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company’s security audit reveals that several mobile devices used for business purposes have been jailbroken, allowing unauthorized software and potential security threats. This situation represents what kind of vulnerability?

Mobile device - Side loading

Mobile device - Jailbreaking

Hardware

Misconfiguration

A

This scenario highlights a jailbreaking vulnerability, where users remove software restrictions on mobile devices, potentially exposing them to security risks. This is different from side loading, which involves installing apps from unofficial sources without bypassing security restrictions, misconfiguration, which involves incorrect settings, or hardware vulnerabilities, which are physical defects or weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization implements a system where employees’ access to information is determined by their job role within the company, restricting access to sensitive data to authorized personnel only. This is an example of which authorization model?

DAC

ABAC

RBAC

MAC

A

Role-Based Access Control (RBAC) is an authorization model where access rights are based on the roles of individual users within an organization. This approach simplifies management of user permissions since access can be controlled based on job roles, making it easier to enforce the principle of least privilege. RBAC is different from Mandatory Access Control (MAC), which is based on policy rules and classifications, Discretionary Access Control (DAC), where the data owner decides on access, and Attribute-Based Access Control (ABAC), which uses policies that evaluate attributes (user, resource, environment) to make decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization decides to document all its security procedures, including response protocols for different types of security incidents. Which category of control does this documentation belong to?

Physical

Managerial

Operational

Technical

A

Documenting security procedures, including incident response protocols, falls under managerial controls. Managerial controls involve the policies, procedures, and guidelines that dictate how the organization manages and protects its information assets. This includes the documentation of security procedures to ensure a standardized and informed response to incidents. Unlike technical controls, which focus on technology-based security measures, or operational controls, which are the execution of these measures, managerial controls deal with the overarching management and strategic framework for security within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When implementing a new system, which change management procedure ensures minimal impact on current operations?

Comprehensive system testing before implementation

User training sessions after implementation

Immediate full-scale implementation

Feedback collection from a pilot group before full-scale implementation

A

Feedback collection from a pilot group before full-scale implementation ensures that any issues can be identified and addressed in a controlled environment, minimizing the impact on current operations when the system is fully implemented. While testing and user training are important, they do not offer the same real-world insights as a pilot, and immediate full-scale implementation carries significant risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When analyzing firewall logs to identify potential malicious activity, which of the following would be the MOST indicative of an attack?

High volumes of allowed inbound traffic during off-peak hours

Repeated failed login attempts from a single external IP address

Consistent traffic flow with known external partners

Occasional spikes in outbound traffic to various destinations

A

Repeated failed login attempts from a single external IP address suggest a brute force attack aiming to gain unauthorized access. High volumes of inbound traffic could be concerning but aren’t necessarily indicative of an attack without further context. Consistent traffic with known partners is expected in normal business operations. Occasional spikes in outbound traffic could be a concern for data exfiltration but would require more context to be deemed malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has decided to evaluate its security posture to ensure it aligns with specific industry regulations. Which type of audit is most appropriate for this scenario?

Internal Audit Committee

External Regulatory Audit

Attestation

Internal Self-Assessment

A

External regulatory audits are the most appropriate choice for companies looking to ensure compliance with industry regulations. These audits are conducted by external entities and are specifically designed to assess whether a company’s practices align with legal and regulatory requirements. Internal self-assessments, attestations, and internal audit committees, while useful for other purposes, do not provide the same level of authoritative assessment against industry regulations that an external regulatory audit does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For cybersecurity training, which method uses a controlled environment to replicate potential security breaches, allowing IT professionals to practice their response?

Failover

Tabletop exercises

Simulation

Journaling

A

Simulations use a controlled environment to replicate security breaches, enabling IT professionals to practice responses, which is more interactive and realistic than tabletop exercises that are discussion-based, journaling that involves keeping records of changes, and failover which is a redundancy mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization is assessing its compliance with the HIPAA. Which role is crucial for ensuring that health information is processed, stored, and transmitted in a manner that complies with HIPAA’s requirements?

Data Processor

HIPAA Compliance Officer

Data Custodian

IT Support Specialist

A

The HIPAA Compliance Officer plays a crucial role in ensuring that health information is processed, stored, and transmitted in compliance with HIPAA’s requirements. This role is specifically focused on understanding HIPAA regulations, implementing policies and procedures to meet those requirements, and ensuring that all parts of the organization comply. While data processors, data custodians, and IT support specialists all have roles in handling and protecting data, the HIPAA Compliance Officer is specifically tasked with oversight and compliance regarding HIPAA regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security analyst is assessing the network of a small business and notices an unusually high amount of traffic on port 23. What is the most likely reason for this observation?

The network is experiencing a DDoS attack

Telnet is being used, which is not secure.

The firewall is misconfigured.

An internal device is downloading updates

A

The use of Telnet, which operates on port 23, is likely the reason for the high traffic observed. Telnet transmits data in plain text, making it insecure for transmitting sensitive information. This method is less secure compared to encrypted alternatives like SSH, which reduces the risk of data interception and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To ensure that emails sent from the corporate office cannot be denied by the sender, the company implements digital signatures. This measure is an example of which security concept?

Availability

Confidentiality

Integrity

Non-repudiation

A

Digital signatures provide non-repudiation by ensuring that once a sender has signed a document or message, they cannot deny having sent it. Non-repudiation is a security concept that prevents an individual or entity from denying the authenticity of their signature on a document or the sending of a message that they originated. This is particularly important in legal, financial, and sensitive communications, ensuring accountability and authenticity. This concept is distinct from confidentiality, which protects data from unauthorized access, integrity, which ensures data remains unchanged and accurate, and availability, which ensures data is accessible when needed.

17
Q

After a security update, a critical application requires a restart to apply the changes. What is the primary concern for this process?

Service restart

Application restart

Documentation

Version control

A

The primary concern for requiring an application restart after a security update is the interruption it causes to the application’s availability, potentially leading to operational downtime. Restarting an application to apply security changes is a necessary step to ensure the update is effective, but it can disrupt user access and service continuity. This concern is more directly related to operational impact and security than service restarts in general, the need for documentation updates, or version control practices.

18
Q

An organization notices an increase in employees receiving SMS messages claiming to be from the company’s HR department, asking for personal details to update employee records. What should be the organization’s immediate response to prevent information leakage?

Advise employees to ignore all SMS messages.

Train employees to verify the legitimacy of such requests through internal channels before responding.

Instruct employees to respond to SMS with the required information if they recognize the sender’s number.

Your answer is incorrect
Encourage employees to block any numbers sending unsolicited SMS messages.

A

Training employees to verify requests through known internal channels before responding addresses the threat without disrupting legitimate communication, enhancing overall security awareness. Instructing employees to respond based on sender recognition can be misleading, as phone numbers can be spoofed. Ignoring all SMS messages is impractical and could lead to missing important communications. Blocking numbers may prevent future messages but does not address the root issue or educate employees.

19
Q

A small business has a limited budget for cybersecurity measures and must choose where to allocate its resources. What factor should primarily guide the business in deciding which cybersecurity threats to address first?

MTBF

RPO

Risk tolerance

Risk appetite

A

Risk tolerance is key for a small business with a limited budget, as it helps the business determine how much risk it is willing to accept before taking action. This guides the allocation of scarce resources to the most critical areas. Risk appetite is related but focuses more on the level of risk a company is willing to pursue; RPO and MTBF are important for planning but do not directly guide threat prioritization.

20
Q

Before deploying a new application, an IT team assesses its dependencies on other software and services within their infrastructure. Why is understanding these dependencies critical?

Dependencies

Restricted activities

Downtime

Allow lists/deny lists

A

Understanding dependencies is critical before deploying a new application because dependencies can affect the application’s functionality, compatibility, and security. If an application relies on other software or services that are outdated or vulnerable, it could inherit those vulnerabilities or fail to operate correctly. This assessment is crucial to ensure that all components work harmoniously and securely, surpassing the concerns related to managing allow lists/deny lists, which control access, restricting activities, or planning for downtime, though those are also important in their contexts.

21
Q

Which technique is utilized to increase computing efficiency by dividing tasks among multiple processors?

A

Parallel processing

Parallel processing divides tasks among multiple processors to enhance computing efficiency, differing from failover and redundancy, which are about system reliability and backup, and UPS, which provides emergency power during outages.