exam 3 Flashcards

1
Q

What is the difference between Mean Time To Restore and Mean Time Between Failures?

A

MTTR (Mean Time To Restore) is the amount of time required to get back up and running. This is sometimes called Mean Time To Repair.

MTBF (Mean Time Between Failures) is a prediction of how long the system will be operational before a failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between Recovery Point Objective and Recovery Time Objective?

A

An RPO (Recovery Point Objective) is a qualifier that determines when the system is recovered. A recovered system may not be completely repaired, but it will be running well enough to maintain a certain level of
operation.

An RTO (Recovery Time Objective) is the service level goal to work towards when recovering a system and getting back up and running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a Processor, Owner, Controller, and Custodian?

A

A data processor performs some type of action to the data, and this is often a different group within the organization or a third-party company.
In this example, the third-party financial organization is the data processor of the employee’s financial data.
The incorrect answers:

B. Owner
The data owner is often an executive of the company and is ultimately responsible for the use and security of this data.

C. Controller
A data controller manages the data. In this example, the human resources team would control the access and use of the employee data.

D. Custodian
A data custodian is responsible for the accuracy, privacy, and security of the data. Many organizations will hire data custodians to ensure all data is properly protected and maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sam would like to send an email to Jack and have Jack verify that Sam was the sender of the email. Which of these should Sam use to provide this verification?

A

Digitally sign with Sam’s private key The sender of a message digitally signs with their own private key to
ensure integrity, authentication, and non-repudiation of the signed contents. The digital signature is validated with the sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data hashing

A

Data hashing creates a unique message digest based on stored data. If the data is tampered with, a hash taken after the change will differ from the original value. This allows the forensic engineer to identify if information
has been changed. would allow a future analyst
to verify the data as original and unaltered?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web filters

A

Web filters contain a large database of categorized website addresses, and this allows an administrator to create rules to block browsing attempts to specific content. For example, a content filter may allow browsing to news and business sites, but block browsing attempts to gaming and shopping sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

❍ A. Service level agreement
❍ B. Memorandum of understanding
❍ C. Non-disclosure agreement
❍ D. Acceptable use policy

A

A service level agreement (SLA) is used to contractually define the minimum terms for services. In this example, the medical imaging company would require an SLA from the network provider for the necessary throughput and uptime metrics.
The incorrect answers:

B. Memorandum of understanding
A memorandum of understanding (MOU) is an informal letter of intent. The MOU is not a signed contract, and there are no contractual obligations associated with the content of an MOU.

C. Non-disclosure agreement
A non-disclosure agreement (NDA) is used between entities to prevent the use and dissemination of confidential information.

D. Acceptable use policy
An acceptable use policy (AUP) commonly details the rules of behavior for employees using an organization’s network and computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A. SLA
❍ B. SOW
❍ C. NDA
❍ D. BPA

A

A SOW (Statement of Work) is a detailed list of tasks, items, or processes to be completed by a third-party. The SOW lists the job scope, location, deliverables, and any other specifics associated with the agreement. The
SOW is also used as a checklist to verify the job was completed properly by the service provider.
The incorrect answers:

An SLA (Service Level Agreement) sets the minimum terms of service between a customer and a service provider. This agreement often contains
terms for expected uptime, response time requirements, and other minimum service levels required by the customer.

An NDA (Non-Disclosure Agreement) is a confidentiality agreement between parties. The agreement is designed to protect information such as trade secrets, business activities, or anything else included in the NDA. An
NDA does not generally contain an itemized list of service requests.

A BPA (Business Partners Agreement) is used between entities going into business together. A list of itemized service requests would not be part of a BPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SD-WAN

A

An SD-WAN (Software Defined Networking in a Wide Area Network) network allows users to efficiently communicate directly to cloud-based applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diffie-Hellman

A

The Diffie-Hellman algorithm can combine public and private keys to derive the same session key. This allows two devices to create and use this shared session key without sending the key across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When verifying the legitimacy of a website, you check its digital certificate to ensure a secure connection. Which cryptographic method is used to bind the certificate to a trusted issuer, like a certificate authority?

A

Digital signatures are essential for digital certificates. A certificate authority (CA) acts like a trusted third party, cryptographically signing the certificate using their own digital signature. This signature verifies the certificate’s authenticity and allows you to confirm it originates from a legitimate CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data custodian

A

Data custodian is the most fitting choice. They are responsible for the day-to-day care, control, access, and security of the customer data within the database. This includes managing access rights to ensure only authorized personnel can view or modify the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data processor

A

Data processor performs specific tasks on the data as instructed by the data owner. They wouldn’t typically manage access rights themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logic Bombs

A

Logic bomb is malware programmed to detonate and cause damage upon meeting a specific trigger condition. It might explain sudden system issues, but the description doesn’t indicate a specific trigger being met (e.g., date or event).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worm

A

Worm is a self-replicating malicious program that spreads across networks. While it could cause performance issues, it wouldn’t necessarily explain the pop-up messages or cursor movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Residual risk

A

This is the correct term for risks that remain after implementing control measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transferred risk

A

This refers to risks that have been shifted to a third party, such as through insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Penetration test

A

A pen test simulates a real-world attack by ethical hackers who attempt to exploit vulnerabilities in the system. This proactive approach helps identify security weaknesses before attackers can discover them. In this scenario, the isolated test environment provides a safe space for pen testers to probe the system for vulnerabilities without impacting production systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Vulnerability scanner

A

Vulnerability scanners are automated tools that can identify known vulnerabilities in systems. They’re a good starting point, but they might miss zero-day vulnerabilities or those requiring human expertise to exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Risk tolerance

A

This represents the level of risk an organization is willing to accept. By understanding the organization’s risk tolerance, the manager can determine the appropriate level of resources to allocate for risk mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SED

A

Self encrypting drives: Encrypts data directly on the laptop’s hard drive, making it unreadable even if the device is lost or stolen. This is critical for field laptops where physical security might be a challenge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A security team discovered a previously patched vulnerability reappearing on servers after a recent update. What security practice can help prevent similar issues in the future?

A

Master image is a reference image used to deploy consistent server configurations. While helpful for maintaining consistency, it wouldn’t necessarily prevent a patch from reintroducing a vulnerability unless the master image itself is updated with the latest secure patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Continuous monitoring

A

Continuous monitoring involves ongoing security checks and scans to identify potential vulnerabilities and threats in systems. By continuously monitoring for vulnerabilities, the security team could have detected the reintroduced issue before it caused problems. This allows for quicker response and patching to prevent exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EPP

A

Endpoint Protection Platform (EPP): EPP focuses on protecting individual devices rather than the overall data flow between on-premises and cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cloud Access Security Broker (CASB)

A

A CASB is specifically designed to secure cloud applications by acting as a gatekeeper between the on-premises environment and the cloud. It provides visibility and control over data flow, enabling organizations to enforce security policies and protect sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Maintaining the baseline

A

This involves making ongoing adjustments and updates to the baseline to ensure it remains effective and up-to-date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Establishing the baseline

A

This is the initial creation of the baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DLP

A

Data loss prevention (DLP): This technology monitors and controls data movement across network boundaries, preventing sensitive information from being copied to unauthorized devices like USB drives.

29
Q

EDR

A

Endpoint detection and response (EDR): Focuses on detecting and responding to threats on endpoint devices, not preventing data leakage.

30
Q

TLS

A

TLS (Transport Layer Security): When configured with appropriate cipher suites, TLS can provide perfect forward secrecy, meaning that the compromise of long-term keys does not compromise the security of past communication sessions.

31
Q

Quantitative risk assessment

A

his method uses numerical data and statistical analysis to assign monetary values to risks.

32
Q

Qualitative risk assessment

A

This type of assessment relies on subjective judgments and expert opinions to prioritize risks based on their potential impact and likelihood, without assigning specific monetary values.

33
Q

AUP

A

Acceptable Use Policy (AUP): An AUP specifically outlines the rules and expectations for using company IT resources, ensuring employees understand what is permitted and prohibited.

34
Q

cipher

A

This is a cryptographic algorithm used to encrypt data, making it unreadable to anyone without the correct decryption key. This ensures that only the intended recipient can access the sensitive information.

35
Q

Elliptic curve cryptography

A

This is a modern and efficient asymmetric encryption algorithm well-suited for mobile devices due to its performance advantages and strong security properties.

36
Q

Hashing

A

Hashing is a one-way function used for data integrity verification, not encryption.

37
Q

Credential replay

A

This attack involves capturing and reusing valid authentication credentials, exactly as described in the scenario. The attacker is replaying a previously captured login session to gain unauthorized access.

38
Q

DAC

A

Discretionary access control (DAC) This allows users to share access to their own data, which is less restrictive and doesn’t meet the requirement for mandatory control over data sensitivity.

39
Q

MAC

A

Mandatory access control (MAC) enforces strict access controls based on security labels assigned to both data and users. It prevents unauthorized access to sensitive information by enforcing a clear separation of duties.

40
Q

ESP

A

Encapsulating Security Payload (ESP) provides comprehensive protection for IPsec tunnels, including data encryption, authentication, and integrity checks. It ensures confidentiality, preventing unauthorized access to the data, and protects against data tampering.

41
Q

IaC

A

Infrastructure as Code (IaC): This approach treats infrastructure resources like servers, networks, and storage as code, allowing them to be managed and provisioned using scripts and automation tools. This improves efficiency, reduces errors, and enables consistent configurations.

42
Q

IaaS

A

Provides computing resources like servers and storage, but doesn’t address automation of infrastructure provisioning.

43
Q

EKU

A

Extended Key Usage (EKU) specifies the intended purpose of the certificate, such as client authentication, email protection, or code signing. It does not relate to multiple domain coverage. EKU is also not within the scope of the Security+ exam and not covered in the objectives. This type of question requires you to know what is and isn’t within the exam objectives.

44
Q

AAA

A

Authentication, authorization, and accounting

45
Q

Failover clustering

A

This solution involves multiple servers working together, with one acting as the primary server and the other as a standby. If the primary server fails, the standby server automatically takes over, ensuring uninterrupted service.

46
Q

CASB

A

Cloud Access Security Broker (CASB) provides visibility and control over cloud services and data, including the ability to monitor data transfers, detect threats, and enforce data encryption policies. It acts as a gatekeeper between the on-premises environment and the cloud, ensuring data security.

47
Q

XSS

A

Cross-site scripting (XSS) this is the correct answer as it involves the injection of malicious script into a trusted website, which is then executed by the user’s browser. This is exactly the scenario described in the prompt.

48
Q
A
49
Q

Cloud Access Security Broker (CASB)

A

A CASB is specifically designed to secure cloud applications by acting as a gatekeeper between the on-premises environment and the cloud. It provides visibility and control over data flow, enabling organizations to enforce security policies and protect sensitive information.

50
Q

Right to be forgotten

A

This is the correct term for an individual’s right to request the deletion of their personal data.

51
Q

Right to data access

A

Grants individuals the right to access their personal data held by an organization.

52
Q

Right to data portability

A

Allows individuals to transfer their personal data between different organizations.

53
Q

PDU

A

Power distribution unit (PDU): This device provides power outlets and often includes monitoring capabilities for power consumption, enabling remote management and control.

54
Q

Sensitive

A

Employee salary information is typically considered sensitive and should be protected from unauthorized disclosure.

55
Q

Public

A

This classification is for information that can be freely shared without restrictions.

56
Q

Playbook

A

This is a step-by-step guide for handling specific incidents, providing clear procedures for security teams to follow.

57
Q

Automation

A

Automating compliance processes can help streamline tasks, reduce human error, and ensure that tasks are completed consistently. This is especially beneficial for large companies with extensive obligations, as it improves both accuracy and efficiency.

58
Q

Corrective control

A

This type of control helps mitigate the impact of a security incident after it has occurred.

59
Q

Compensating control

A

This type of control is implemented when a primary control (like the existing security measures) might not be fully effective. The backup and restore process acts as a secondary layer of protection to mitigate the impact of a successful attack.

60
Q

A company is considering implementing asymmetric encryption to protect sensitive data. Which use case would best leverage the strengths of asymmetric encryption?

A

Authenticating users

61
Q

PFS

A

Perfect forward secrecy: This cryptographic mechanism ensures that the compromise of a session key does not compromise the security of previous or future communications.

62
Q

Preventive

A

A locked door prevents unauthorized access to the server room, acting as a proactive security measure.

63
Q

S/MIME

A

S/MIME is a standard used for encrypting and signing emails, providing confidentiality, integrity, authentication, and non-repudiation. It’s commonly used in legal and business communications to securely exchange sensitive information, ensuring the recipient is authenticated, and the contents remain confidential and unaltered.

64
Q

SCAP

A

Security Content Automation Protocol (SCAP): A framework for specifying and communicating security data, but doesn’t provide a standardized scoring system for vulnerabilities.

65
Q

Perfect forward secrecy

A

This cryptographic concept involves generating unique session keys for each communication session, ensuring that the compromise of long-term keys does not compromise the security of past communications.

66
Q

MTTR

A

Mean time to repair (MTTR): This metric measures the average time it takes to restore a system to full operation after a failure. In this case, the MTTR is 20 minutes.

67
Q

A company is developing a new e-commerce platform to process credit card payments securely. Which cryptographic algorithm is commonly used for encrypting data in transit and for digital signatures in this context?

A

RSA – This is an asymmetric encryption algorithm that uses a pair of keys, a public key and a private key. It’s widely used in e-commerce for secure data transmission (SSL/TLS) and digital signatures, providing authentication and data integrity.

68
Q

Risk mitigation

A

This is the correct answer. It involves taking proactive steps to reduce the impact or probability of a risk occurring. This might include implementing security controls, such as firewalls, intrusion detection systems, or employee training.

69
Q
A