Module 1 Flashcards
After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and will be a supervisor over a group of security technicians. Which of these generally recognized security positions has she been offered?
- Security administrator
- Security technician
- Security officer
- Security manager
Security manager
The security manager reports to the CISO and supervises technicians, administrators, and security staff.
Which of the following is FALSE about the CompTIA Security+ certification?
- The Security+ certification is a vendor-neutral credential.
- Security+ is one of the most widely acclaimed security certifications.
- Security+ is internationally recognized as validating a foundation level of security skills and knowledge.
- The Security+ certification is a vendor-neutral credential.
- Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification.
Professionals who hold the Security+ certification earn about the same or slightly less than security professionals who have not achieved this certification.
The value for an IT professional who holds a CompTIA security certification is significant. On average, an employee with a CompTIA certification will command a salary that is between 5 to 15 percent higher than their counterparts with similar qualifications but lacking a certification.
Which of the following is TRUE regarding the relationship between security and convenience?
- Security and convenience are equal in importance.
- Security is less important than convenience.
- Security and convenience are inversely proportional.
- Security and convenience have no relationship.
Security and convenience are inversely proportional. The relationship between these two is inversely proportional so that as security is increased, convenience is decreased
What is the term used to describe the connectivity between an organization and a third party?
- Network layering
- System integration
- Resource migration
- Platform support
System integration
Almost all third parties today require that they can access the organization’s computer network. This gives these external entities the ability to perform their IT-related functions (such as outsourced code development) and even do basic tasks such as submitting online invoices. This connectivity between the organization and the third party is known as system integration.
Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.
- through a long-term process that results in ultimate security
- through products, people, and procedures on the devices that store, manipulate, and transmit the information
- using both open-sourced as well as supplier-sourced hardware and software that interacts appropriately with limited resources
- on electronic digital devices and limited analog devices that can connect via the Internet or through a local area network
-through products, people, and procedures on the devices that store, manipulate, and transmit the information
The products, people, and procedures on the devices that store, manipulate, and transmit the information provide the security.
In an interview, the interviewer introduced the following scenario:
An enterprise is hosting all its computing resources on a cloud platform, and you need to identify which vulnerability is most likely to occur.
Which of the following should you choose?
- Zero-day vulnerability
- Configuration vulnerability
- Physical access vulnerability
- Third-party vulnerability
-Configuration vulnerability
Misconfiguration vulnerabilities are often found in cloud platforms, as company personnel responsible for securing the platform might improperly configure the resources, resulting in a vulnerability.
Zero-day vulnerabilities and configuration vulnerabilities can heavily impact a system if exploited. How should you differentiate between a zero-day vulnerability and a configuration vulnerability?
- A zero-day vulnerability is an easily fixable vulnerability recognized by a software developer, whereas a configuration vulnerability is a major vulnerability present in a system exploited by a threat actor before the software developer can fix it.
- A zero-day vulnerability results from improper hardware configurations, whereas a configuration vulnerability results from improper software configuration.
- A zero-day vulnerability results from users improperly configuring software, whereas a configuration vulnerability results from the developers improperly configuring the software.
- A zero-day vulnerability is an unknown vulnerability in released software that is found and exploited by a threat actor, whereas a configuration vulnerability is caused by improper settings in hardware or software.
A zero-day vulnerability is an unknown vulnerability in released software that is found and exploited by a threat actor, whereas a configuration vulnerability is caused by improper settings in hardware or software.
A zero-day vulnerability is uncovered first by threat actors, who exploit it to penetrate systems. A configuration vulnerability occurs when a user misconfigures the system or fails to configure it past the default settings.
Social engineering is a means of eliciting information by relying on the weaknesses of individuals. How should you differentiate between the social engineering techniques of phishing and pharming?
- Phishing involves digging through trash receptacles to find information that can be useful in an attack, whereas pharming involves sending millions of unsolicited emails to a large volume of users.
- Phishing involves sending an email message or displaying a web announcement that falsely claims to be from a legitimate enterprise, whereas pharming is a redirection technique that attempts to exploit how a URL is converted into its corresponding IP.
- Phishing involves sending millions of generic email messages to a large volume of users, whereas pharming targets specific users by sending emails customized to the recipients, including their names and personal information.
- Phishing involves sending customized emails to recipients, including their names and personal information, to make the message appear legitimate, whereas pharming is a variant of phishing that specifically targets wealthy individuals or senior executives within a business.
Phishing involves sending an email message or displaying a web announcement that falsely claims to be from a legitimate enterprise, whereas pharming is a redirection technique that attempts to exploit how a URL is converted into its corresponding IP.
Correct. Phishing involves sending an email message or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information or taking action. Pharming is a redirection technique that attempts to exploit a URL by converting its corresponding IP address. A threat actor may install malware on a user’s computer that redirects traffic away from its intended target to a fake website instead.
Which issue can arise from security updates and patches?
- Difficulty resetting passwords
- Difficulty patching firmware
- Difficulty updating settings
- Difficulty installing databases
Difficulty patching firmware
Updating firmware to address a vulnerability can often be difficult and requires specialized steps. Furthermore, some firmware cannot be patched.
A federal appeals court recently made a judgment that caused significant public outrage. Soon after the ruling, the court’s website was hacked, and the content was replaced with the text “Equal justice for all.”
Which of the following type of threat actors attacked the court’s site?
- Insiders
- State actors
- Cyberterrorists
- Hacktivists
Hacktivists are individuals who attack a computer system or network for socially or politically motivated reasons.
Which of the following is the most common method for delivering malware?
- Social media
- Identity theft
- Removable media
Almost 94 percent of all malware is delivered through email to an unsuspecting user. The goal is to trick the user into opening an attachment that contains malware or click a hyperlink that takes the user to a fictitious website.
Attackers have taken over a site commonly used by an enterprise’s leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations.
Which type of malicious activity is this?
- Spear phishing
- Vishing
- Hoax
- Watering hole
Watering hole
A watering hole attack is directed towards a smaller group of specific individuals, such as the top executives working for a manufacturing company. These executives all tend to visit a common website, such as a parts supplier to the manufacturer. An attacker who wants to target this group of executives tries to determine the common website they frequent and then infects it with malware that will make its way onto the group’s computers.
Threat actors focused on financial gain often attack which of the following main target categories?
- Social media assets
- REST services
- Product lists
- Individual users
Individual users
This category focuses on individuals as the victims. Threat actors steal and use data, credit card numbers, online financial account information, or social security numbers or send millions of spam emails to peddle counterfeit drugs, pirated software, fake watches, and pornography to profit from their victims.
Your enterprise has played fast and loose with customer information for years. While there has been no significant breach of information that could damage the organization and/or their customers, many in the enterprise feel it is only a matter of time before a major leak occurs.
Which type of threat actor is an employee who wishes to personally ensure that the enterprise is exposed and blocked from accessing their customers’ information until they ensure more secure protocols?
Hacktivist
Script kiddy
Insider
State actor
Hacktivist
Which of the following is an attack vector used by threat actors to penetrate a system?
- Phishing
- Intimidation
- Urgency
Almost 94 percent of all malware is delivered through email to an unsuspecting user. The goal is to trick the user into opening an attachment that contains malware or click on a hyperlink that takes the user to a fictitious website.