CompTIA Security+ (SY0-701) Practice Exam 1 Revision Flashcards
Revise Incorrect question
An organization is developing a new software application and plans to include a feature that collects user data for personalization purposes. Which security principle should be prioritized to ensure user data is protected?
Collecting only the data necessary for the application’s functionality.
Implementing strong user authentication mechanisms.
Ensuring the software is free from vulnerabilities by conducting regular security audits.
Encrypting all data in transit and at rest.
Prioritizing the collection of only the data necessary for the application’s functionality directly addresses privacy concerns and minimizes the risk associated with data breaches. By limiting the amount of collected data, the organization reduces the potential impact on users in the event of unauthorized access. While implementing strong user authentication mechanisms, ensuring the software is free from vulnerabilities, and encrypting all data are crucial security practices, focusing on minimizing data collection inherently reduces the scope of what needs to be protected, thereby enhancing overall security and privacy.
Which agreement type is best suited for establishing the general terms and conditions between an organization and its vendors, which will govern future transactions and services?
MSA
The Master Service Agreement (MSA) is best suited for establishing the general terms and conditions between an organization and its vendors. MSAs define the framework under which future transactions and services will be conducted, making it easier to negotiate future agreements or SOWs. Service-level agreement (SLA) focus on performance metrics and expectations, Memorandum of understanding (MOU) are more about mutual intentions without legal enforceability, and Work order (WO)/statement of work (SOW) detail the specific tasks, timelines, and payments for particular projects.
A laptop manufacturer wants to ensure the security of user data by providing a hardware-based method to store cryptographic keys used for disk encryption securely. Which tool would be most appropriate for this purpose?
TPM
Secure Enclave
HSM
Key Management System
A Trusted Platform Module (TPM) is the most suitable tool for securely storing cryptographic keys used for disk encryption on laptops. TPMs are specialized, secure cryptoprocessors designed to secure hardware through integrated cryptographic keys. Their primary purpose is to protect information on devices by providing hardware-based, security-related functions, including generating, storing, and limiting the use of cryptographic keys. Unlike HSMs, which are typically used in data centers and enterprise environments for managing keys at a larger scale, TPMs are ideal for individual devices. A Key Management System manages digital keys but lacks the hardware-specific security features of TPMs, and Secure Enclaves, while similar, are more commonly associated with mobile devices and specific to manufacturer implementations.
To ensure the confidentiality of email communications, an organization decides to implement a system where emails are encrypted before being sent and can only be decrypted by the intended recipient. What type of encryption does this scenario best describe?
Symmetric
Full-Disk
Key Exchange
Asymmetric
Asymmetric encryption is best suited for this scenario because it uses a pair of keys for encryption and decryption: a public key to encrypt data and a private key to decrypt it. This method ensures that only the intended recipient, who possesses the corresponding private key, can decrypt the email, maintaining confidentiality. Symmetric encryption, involving a single key for both encryption and decryption, wouldn’t easily facilitate secure key distribution among multiple parties. Key exchange is a method for securely sharing encryption keys, not an encryption type per se. Full-disk encryption is used to encrypt entire disks, not individual email communications.
During a vulnerability scan, which of the following activities is MOST critical to ensuring the effectiveness of the scan?
Updating the scanning tool to its latest version
Selecting the correct scan type and depth
Scheduling the scan during off-peak hours
Ensuring the scan results are encrypted
While updating the scanning tool, encrypting scan results, and scheduling scans during off-peak hours are good practices, selecting the correct scan type and depth directly impacts the scan’s ability to accurately identify vulnerabilities by ensuring that the scan is appropriately targeted and comprehensive, addressing the specific needs and architecture of the environment being scanned.
What is the primary goal of conducting a tabletop exercise as part of an incident response plan?
To simulate a cyber incident in a controlled environment to evaluate the response plan
To conduct a technical assessment of the organization’s network security
To review and update the organization’s security policies
To physically test the security of the organization’s infrastructure
A tabletop exercise simulates a cyber incident in a controlled, discussion-based format to evaluate the effectiveness of the organization’s incident response plan. It involves key personnel discussing their roles and responses to a hypothetical scenario, which helps identify gaps and areas for improvement without the need for technical assessments or physical testing. This activity focuses on the strategic and operational aspects of response planning rather than technical or physical security testing.
A security team is implementing a new SIEM system. Which of the following activities is most important for ensuring the effectiveness of the SIEM in identifying security incidents?
Training staff on basic cybersecurity principles.
Customizing alert thresholds.
Regularly updating antivirus definitions.
Increasing storage capacity for logs.
Customizing alert thresholds is crucial for ensuring that the SIEM system can effectively identify anomalies and potential security incidents without overwhelming the security team with false positives. While increasing storage, training staff, and updating antivirus are important security practices, they do not directly contribute to the effectiveness of a SIEM system in identifying security incidents.
To study APTs and their lateral movements within a network, a security team creates a simulated network environment filled with decoy data and systems. What is this an example of?
Honeypot
Honeyfile
Honeynet
Honeytoken
A honeynet is a simulated network environment that contains multiple honeypots, designed to mimic a real network. It is used to attract and engage attackers, allowing security teams to study advanced persistent threats (APTs) and their tactics, including lateral movements within a network. Unlike a single honeypot, which mimics one system or server; honeyfiles, which are decoy files; or honeytokens, which are decoy data elements, a honeynet provides a more complex and interactive environment to analyze attacker behaviors in a controlled manner.
What does DKIM provide?
DKIM (DomainKeys Identified Mail) primarily addresses the prevention of email spoofing by allowing the receiving email server to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. This is achieved through the use of a digital signature linked to the domain’s DNS records. While DKIM can indirectly help authenticate email senders, its main purpose is to prevent spoofing by verifying that the message’s content has not been altered in transit, thereby contributing to the overall authenticity and integrity of the email.
What are the benefits of decentralized governance structure?
A decentralized governance structure allows an organization to enhance its adaptability to specific regional requirements. This structure supports local decision-making and enables the organization to quickly respond to regional, legal, and regulatory changes. While reduced operational costs and increased data redundancy might be benefits of other organizational decisions, they are not directly related to the primary advantage of a decentralized governance structure regarding security. Centralized security policy management is, by definition, not a feature of decentralized governance.
How does the CVE aid in vulnerability management?
By offering a unique identifier for publicly known vulnerabilities.
The Common Vulnerability Enumeration (CVE) system aids in vulnerability management by providing a unique, standardized identifier for each publicly known vulnerability. This facilitates clear communication and coordination among security professionals, vendors, and other stakeholders, ensuring that discussions and documentation about specific vulnerabilities are consistent and accurately referenced. Unlike the other options, CVE does not directly guide patch management, fix security flaws, or assess financial impacts but rather serves as a critical tool for identifying and discussing vulnerabilities.
An organization forms a dedicated security incident response team to handle any security breaches or incidents. Under which category of control does the formation of this team fall?
Operational
The formation of a dedicated security incident response team is an operational control. Operational controls are about the procedures and actions taken by the organization to implement its security policies and respond to incidents. Having a dedicated team ensures that there are specific procedures and resources in place to address and manage security incidents effectively. Unlike managerial controls, which involve the creation of policies and strategies, or technical controls, which use technology to secure the organization’s assets, operational controls are the execution of these policies through specific actions and procedures.
In the context of identity and access management, which of the following best ensures that users have access only to the resources they’ve been explicitly granted?
RBAC
ABAC
DAC
MAC
RBAC is effective in ensuring users have access only to what they need according to their role within the organization, aligning with the principle of least privilege. MAC is more about classification and clearance levels, not necessarily about roles. DAC allows owners to decide on access, which could lead to more permissive access than necessary. ABAC can be highly granular but is complex and not inherently about restricting access to only what’s been explicitly granted.
Which of the following best exemplifies the use of OSINT in vulnerability management?
Analyzing internal audit logs
Monitoring dark web forums for leaked data
Consulting a commercial vulnerability database
Gathering information from publicly available sources
While monitoring dark web forums and consulting commercial databases can be part of a comprehensive vulnerability management strategy, OSINT specifically refers to the collection and analysis of publicly available information to inform security practices. This includes sources like public databases, forums, and social media, which can provide insights into emerging threats and vulnerabilities without the need for proprietary data or insider information.
In the context of identity and access management, what is the main purpose of de-provisioning user accounts?
To ensure users have access to additional resources as needed
To remove access rights and resources when they are no longer required
To remove access rights and resources when they are no longer required
To increase the security of the network by adding more user accounts
De-provisioning user accounts is crucial for removing access rights and resources from users who no longer need them, such as when an employee leaves the company. This process is essential for maintaining tight security controls and ensuring that unauthorized individuals cannot access sensitive information. The other options do not accurately represent the purpose of de-provisioning, as they do not involve removing unnecessary access, which is the primary goal of de-provisioning.