CompTIA Security+ (SY0-701) Exam 5 Revision Flashcards

1
Q

During an online purchase, a user is redirected to a payment gateway that closely resembles the original website but has slight differences in design and URL. The user is prompted to enter their credit card details. This situation is an example of:

Watering hole

Typosquatting

Phishing

Impersonation

A

This is a form of phishing, where the user is directed to a fraudulent website that mimics a legitimate one to steal financial or personal information. Unlike a watering hole attack, which targets specific user groups by compromising commonly visited sites, typosquatting, which involves domain name misspelling without direct redirection, or impersonation, which involves an attacker pretending to be another individual, this scenario specifically involves tricking the user into entering sensitive information on a fake platform that they were redirected to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To manage changes in security procedures and ensure that only the most current policies are applied, an organization employs a version control system. What aspect of change management does this practice address?

Version control

Dependencies

Downtime

Documentation

A

Employing a version control system to manage changes in security procedures addresses the aspect of version control within change management. Version control is crucial for tracking modifications to documents and ensuring that personnel are referencing the most current policies, procedures, and guidelines. This practice helps prevent confusion and ensures that security measures are up-to-date and effective, highlighting the importance of version control in maintaining the integrity and relevance of security documentation over concerns related to dependencies, operational downtime, or the broader category of documentation management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization notices an increase in emails sent from external addresses that closely resemble the company’s domain, attempting to trick employees into transferring funds or revealing sensitive information. This technique is known as:

Brand impersonation

Pretexting

Business email compromise

Typosquatting

A

This refers to the practice of typosquatting, where attackers register domain names that are slight misspellings of legitimate ones to deceive individuals. In this context, it is being used to mimic the company’s domain in an attempt to trick employees. This differs from business email compromise, which specifically targets high-level transactions and decisions, brand impersonation, which involves pretending to be the company rather than just using a similar domain, and pretexting, which involves constructing a fabricated scenario or story.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When aiming for resilience in security architecture, which factor involves the ability to quickly recover from disruptions and maintain essential functions?

Continuity of operations

Multi-cloud systems

High availability

Platform diversity

A

Continuity of operations focuses on the ability to maintain essential functions during and after a disruption. While high availability ensures systems are accessible with minimal downtime, continuity of operations ensures critical functions can continue even when systems are disrupted. Platform diversity and multi-cloud systems provide redundancy but may not directly address the continuity of operations aspect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization’s CFO receives an email from the CEO, who is currently traveling, asking for an urgent wire transfer to a new vendor. The email address looks correct at first glance, but closer inspection reveals a minor alteration. This is an example of what type of attack?

Pretexting

Impersonation

Business email compromise

Typosquatting

A

This scenario describes a business email compromise (BEC) attack, where an attacker impersonates a high-level executive to deceive the organization into making a financial transaction. The minor alteration in the email address is a common tactic used in BEC to trick the recipient into believing the request is legitimate. Unlike pretexting, which involves creating a fake scenario, typosquatting, which involves registering misspelled domain names, or impersonation, which doesn’t necessarily involve financial requests, BEC specifically targets financial transactions based on authority misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In terms of risk transference, which of the following strategies would a company employ when adopting an IaaS model?

Implementing redundant system design

Using proprietary software

Outsourcing security
management to a third party

Purchasing cyber insurance

A

Purchasing cyber insurance is a form of risk transference where a company shifts potential financial losses due to cyber incidents to an insurance company. While outsourcing security management and implementing redundant designs are ways to mitigate risks, they do not transfer the risk. Using proprietary software is more related to security control rather than risk transference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the context of industrial control systems, which of the following is the most critical aspect to ensure the security and reliability of a SCADA system?

Using a real-time operating system

High availability configuration

Containerization of applications

Implementing IoT devices

A

High availability configuration is the most critical aspect to ensure the security and reliability of a SCADA system, as it ensures that the system remains operational even in the event of component failures, unlike IoT devices or containerization, which do not inherently provide the same level of reliability for industrial control systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After repeatedly failing to access an account with a single password, an attacker switches tactics and begins trying numerous passwords against multiple usernames. What type of password attack does this scenario describe?

Brute force

Spraying

Replay

Buffer overflow

A

A brute force attack involves trying many passwords or phrases to guess the correct one, distinguishing it from spraying, which uses common passwords against many accounts. Buffer overflow and replay attacks do not directly relate to password guessing but involve memory manipulation and data retransmission, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In terms of infrastructure security, what is a major advantage of microservices over monolithic architectures?

Easier to update and patch

Less complex networking

Centralized security management

Higher computational overhead

A

Microservices architectures offer an advantage in terms of infrastructure security because they are easier to update and patch compared to monolithic architectures. This modularity allows for targeted updates and quicker responses to vulnerabilities within specific services, without needing to redeploy the entire application, enhancing the overall security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the context of web security, which method is MOST effective in preventing SQL injection attacks?

Encrypting all data stored in the database.

Using CAPTCHA on all input forms.

Employing prepared
statements and parameterized queries.

Conducting regular security audits of the website.

A

SQL injection attacks manipulate backend databases by injecting malicious SQL code through application inputs. Using prepared statements and parameterized queries is the most effective defense, as they separate SQL logic from data, making it impossible for an attacker to alter the structure of an SQL query by injecting malicious code. Encrypting data, using CAPTCHA, and conducting audits are beneficial security measures but do not specifically address the vulnerability exploited by SQL injection attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What distinguishes a nation-state actor from other types of cyber threat actors in terms of their cyber attack capabilities?

Internal

Resources/funding

Level of sophistication/capability

External

A

Nation-state actors are distinguished by their high level of sophistication and capability in cyber attacks, often employing advanced techniques and tools that are not available to other actors. This high level of sophistication allows them to conduct complex cyber espionage, sabotage, or influence operations. In contrast, other actors may lack the resources, funding, or technical expertise to execute attacks of similar complexity and scale, making sophistication and capability key distinguishing factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of vulnerability exceptions in a vulnerability management program?

To replace the need for implementing compensating controls

To document and acknowledge the acceptance of risk for unremediated vulnerabilities

To provide a temporary measure until a patch is applied

To ignore vulnerabilities that cannot be patched

A

The role of vulnerability exceptions in a vulnerability management program is to document and acknowledge the acceptance of risk for vulnerabilities that cannot be remediated within the standard timeframe or for which no immediate remediation is available. This process involves a formal risk assessment and approval by appropriate stakeholders, ensuring that the decision to accept the risk is made consciously. This is not a means to ignore vulnerabilities, nor does it replace the need for compensating controls, which should still be considered to reduce risk exposure. Granting an exception is a temporary measure, emphasizing the need for a plan to address the vulnerability in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An executive receives a text message urging immediate action: a link is provided to update their password due to a purported security breach. The message instills urgency but lacks specific details about the executive or their role. What type of social engineering attack is this?

Business email compromise

Smishing

Vishing

Watering hole

A

This scenario typifies smishing, where attackers use SMS (text messages) to deceive individuals into clicking malicious links or providing personal information, often by creating a sense of urgency. Unlike vishing, which uses voice calls, business email compromise, which involves hacking or impersonating corporate emails, or watering hole attacks, which target specific user groups by compromising websites they are likely to visit, smishing specifically utilizes SMS as the medium of deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

During a digital forensic investigation, a security analyst discovers that an attacker has created a fraudulent website that closely resembles a legitimate one, tricking users into entering sensitive information. Which type of attack does this scenario describe?

Replay

Directory traversal

Forgery

Buffer overflow

A

Forgery involves creating a fake document, website, or other data to deceive individuals or systems. This is unlike buffer overflow, replay, and directory traversal attacks, which are technical attacks aimed at exploiting system vulnerabilities rather than deceiving users directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A financial institution needs to securely transmit customer account information between its branches. Which method would be most effective in protecting this data during transmission?

Segmentation

Masking

Encryption

Hashing

A

Encryption is the most effective method for protecting data during transmission between branches of a financial institution. It ensures that the data remains confidential and secure, even if intercepted by unauthorized parties. Hashing, segmentation, and masking are not suitable for protecting data during transmission and may not provide the necessary level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who is most likely to commit cybercrimes such as intellectual property theft or selling trade secrets, motivated by personal grievances or financial incentives?

Organized crime

Hacktivist

Nation-state

Insider threat

A

Insider threats come from individuals within an organization who misuse their access to commit crimes such as intellectual property theft, often motivated by personal grievances or financial incentives. This distinguishes them from hacktivists, focused on political or social causes; organized crime, which generally targets external entities for financial gain; and nation-states, which pursue espionage for political, military, or economic advantage.

17
Q

A company wants to protect its critical business data from unauthorized access. Which method would be most effective in achieving this goal?

Masking

Tokenization

Segmentation

Encryption

A

Encryption is the most effective method for protecting critical business data from unauthorized access. It ensures that even if unauthorized parties gain access to the data, they cannot read or interpret it without the decryption key. Masking, tokenization, and segmentation can complement encryption but do not provide the same level of data protection against unauthorized access.

18
Q

A mobile payment app needs to secure payment data on devices while ensuring that transaction processing is performed securely and efficiently. Which technology is best suited for storing sensitive information and performing secure transactions on mobile devices?

Key Management System
TPM

Secure Enclave
Your answer is incorrect

HSM

A

The Secure Enclave is best suited for storing sensitive information and performing secure transactions on mobile devices. It is a dedicated coprocessor designed to provide hardware-based key storage and cryptographic operations, ensuring that sensitive data, such as fingerprints and payment information, is stored securely within a tamper-resistant area of the processor. Unlike TPMs, which are more commonly found in laptops and desktops, or HSMs, which are external devices used for managing encryption keys at an organizational level, Secure Enclaves are specifically designed for mobile devices, offering a high level of security for mobile payment applications by isolating and protecting sensitive data and processes from the rest of the device.

19
Q

A security team member receives an email that appears to be from a trusted vendor asking for immediate confirmation of account details due to a security breach. What kind of security threat does this scenario describe?

Logic bomb

Social engineering

Spear phishing

Ransomware

A

Spear phishing is a targeted email attack where the attacker, posing as a trusted entity, attempts to trick individuals into divulging sensitive information, such as account details. Unlike broad phishing attempts, spear phishing is highly targeted, making it more deceptive and potentially more damaging than other forms of attacks like ransomware or logic bombs, which are types of malware, or general social engineering tactics that may not rely on specific targeting.

20
Q

An organization is reviewing its security logs and notices multiple authentication requests to its web application from different geographic locations within a short timeframe, all using the same user ID. Which type of attack should be suspected?

Replay

Brute force

Privilege escalation

Spraying

A

This situation is indicative of a replay attack, where a valid data transmission is maliciously or fraudulently repeated or delayed. This is distinct from password spraying, brute force attacks, and privilege escalation, which involve common passwords, exhaustive password attempts, and unauthorized access elevation, respectively.

21
Q

In resilience planning, which site consideration involves having operational servers, but with limited resources and minimal redundancy?

Cold

Warm

Geographic dispersion

Hot

A

A warm site has operational servers with limited resources and minimal redundancy, making it less costly than a hot site but still requiring some setup time in the event of a disaster. Hot sites have fully equipped operational servers ready for immediate use, while cold sites lack operational servers altogether. Geographic dispersion refers to spreading resources across different locations for redundancy.