Multiple Choice Flashcards
Which of the following is one of the benefits of using session keys and ephemeral keys?
Non-repudiation
Security through obscurity
Key stretching
Perfect forward secrecy
Perfect forward secrecy
Overall explanation:
Perfect forward secrecy is the idea that if one session or a small subset of the data is compromised, the rest of the data (or sessions) cannot also be compromised because a different encryption key was used to encrypt the data. Security through obscurity is the idea that a system should be secure so long as proprietary information about the system is not made available outside of a small working group. Key stretching is the idea that you can make the resulting message digest or hash more difficult to crack by complicating the process by which you’re creating the hash such as salting, peppering, or running the password or passphrase through the algorithm multiple times. Non-repudiation is the idea that someone cannot deny that they have performed a particular action.
Preston has noticed a user sending quite a few pictures by e-mail to his personal account. He suspects the user is hiding malicious or private information inside of the images, but he cannot decipher what that information may be. Which of the following might the user be using?
Hashing
Key exchange
Digital signatures
Steganography
Steganography
Overall explanation:
Steganography is a method of hiding and encrypting information inside a media file that is extremely difficult to detect or decipher when using the appropriate methods and technologies.
Adele wants to deploy a certificate to cover her company’s top-level domain name as well as any subdomains. Which of the following types of certificates might she choose to deploy?
Stapled
Pinned
Wildcard
Extended validation
Wildcard
Overall explanation:
A wildcard certificate can be used to cover a domain name as well as any subdomains as well. An asterisk is typically used as a wildcard, so you might see it listed as *.domain.com. These are common for sites that have many domain names that may change or be added frequently, so you don’t have to issue a certificate for each one individually.
Which of the following are the three components of AAA?
Authorization, Auditing, Accounting
Aggregation, Authentication, Authorization
Authentication, Authorization, Accounting
Accounting, Aggregation, Auditing
Authentication, Authorization, Accounting
Overall explanation:
AAA is composed of authentication, authorization, and accounting.
Domain:
1.2 - Summarize fundamental security concepts.
Janet wants to ensure that the file she downloaded was transmitted successfully without any errors. Which of the following could she use to verify this? (Choose two.)
AES
TLS
SHA
MD5
Overall explanation:
SHA and MD5 are hashing algorithms. She could use a program to create a hash of the file on the remote system (or some websites will list the hash if it’s posted publicly) and then use a program to create a hash of the file she downloaded. If the hashes match, likely, that the file was transmitted successfully without any errors.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Which of the following hashing algorithms will provide a hash with the longest bit length?
MD5
AES
SHA
3DES
SHA
Overall explanation:
SHA will provide the longest hash. MD5 is a weaker hashing algorithm that uses smaller hashes. AES and 3DES are not hashing algorithms.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Sanjay has just posted signage at the driveway to the company’s offices that trespassing is prohibited and that unauthorized persons will be prosecuted to the fullest extent of the law. Which of the following types of controls has he put into place?
Deterrent
Corrective
Technical
Detective
Deterrent
Overall explanation:
Signage is considered a deterrent control. While it may stop some people, it obviously won’t stop everyone. Thus, other forms of control should be put into place as well.
Domain:
1.1 - Compare and contrast various types of security control.
James has just returned from a security conference where he learned about a technique that some companies use to distract attackers. It consists of a small group of servers that contain fake information and are used to lure the attacker to spend their time trying to exploit those servers rather than the actual servers containing confidential and proprietary information. Which of the following best describes the technique that James learned about?
Honeynet
Rogue access point
DMZ
Evil twin
Honeynet
Overall explanation:
A honeynet is a group of honeypots on a network and is used to lure an attacker toward them instead of the real infrastructure within an organization. They may also be used to watch the methods that the attackers are using as part of research into new attack vectors and techniques.
Domain:
1.2 - Summarize fundamental security concepts.
Christina is trying to decide how best to store hashes of user passwords for an application. She feels that just using the standard SHA1 algorithm may not be strong enough. Which of the following might she add to the password being hashed?
MD5
Ephemeral key
Collision
Salt
Salt
Overall explanation:
A salt is a unique string or set of characters that can be added to a password before the combined string is run through a one-way hashing algorithm. An ephemeral key is a temporary key used for encryption. MD5 is another hashing algorithm. A collision is when more than one set of data will result in the same message digest, or hash when run through a hashing algorithm.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Philip is making plans to upgrade an application server used by multiple teams worldwide. As part of the upgrade, there will be a small amount of downtime that he needs to advertise to certain teams. Which of the following does he need to incorporate into his communication plan?
A maintenance window
Backout plan
Diagrams of system interconnection
Dependencies involved in the upgrade
A maintenance window
Overall explanation:
Philip should communicate the timeframe of the maintenance window and that the application will potentially be unavailable during part or all of that time.
Domain:
1.3 - Explain the importance of change management processes.
Jon wants to use certificates for a Java application he is developing but wants to ensure they are not human-readable. Which of the following certificate types should he choose?
DER
PEM
P7B
CRL
DER
Overall explanation:
The distinguished encoding rules, or DER, format is the only certificate type listed that uses a binary format for the file. PEM and P7B certificates are both stored in an ASCII format, which is human-readable. A certificate revocation list is not a type of certificate.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Which of the following is a simple substitution cipher?
ROT-13
Twofish
CBC
XOR
ROT-13
Overall explanation:
ROT-13 is a simple substitution cipher whereby one letter can be substituted for another in a string of text. Specifically, you would rotate 13 characters through the alphabet to find the letter that is being substituted. XOR is an additive cipher. Cipher block chaining is not a substitution cipher, and Twofish is a much more complicated symmetric encryption algorithm.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Which of the following cipher modes does WPA2 make use of?
GCM
CBC
AES
ECB
CBC (CCMP)
Overall explanation:
WPA2 uses CCMP to protect the communications being sent over RF between a client and the wireless access point. While it is a derivation of AES, AES is not a cipher mode, which is what the question specifically asked. CCMP is the Counter Mode (CM) Cipher Block Chaining (CBC) Message Authentication Code (MAC) Protocol.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
George wants to send Izzie an e-mail that has been digitally signed. Which of the following keys should George use to digitally sign the e-mail?
George’s Public Key
George’s Private Key
Izzie’s Public Key
Izzie’s Private Key
George’s Private Key
Overall explanation:
The first thing you need to remember here is that digitally signing an e-mail is not the same thing as sending an encrypted e-mail. When digitally signing an e-mail, the system takes a hash of the message and encrypts it with the sender’s private key. Thus, anyone can decrypt that hash using the sender’s public key and verify that the message contents have not changed in transit. The receiver’s public and private keys do not come into play at all here.
Domain:
1.4 - Explain the importance of using appropriate cryptography.
Krista has just installed a new firewall at the perimeter of her company’s network. Which of the following categories of controls does this fall under?
Physical
Technical
Administrative
Deterrent
Technical
Overall explanation:
A firewall is considered a technical control. We are using technology to be able to permit or deny traffic.
Domain:
1.1 - Compare and contrast various types of security control.
Which of the following BEST describes a threat actor who primarily depends on commonly found tools, often easily accessible from the web or dark web?
Bug bounty hunter
Ethical hacker
APT
Script kiddie
Script kiddie
Overall explanation:
OBJ: 2.1 - Typically a novice in cyber-attacks, a script kiddie heavily relies on off-the-shelf tools without much understanding of how they work. A Bug bounty hunter is an individual who seeks software vulnerabilities in exchange for rewards or compensation but doesn’t rely solely on basic, common tools. Advanced persistent threats (APTs) are often state-sponsored groups with significant resources, known for long-term, targeted attacks using a variety of sophisticated tools and techniques. An ethical hacker is a cybersecurity professional who systematically attempts to penetrate systems on behalf of its owners to find vulnerabilities.
Domain:
Threats, Vulnerabilities, and Mitigations
Which of the following terms emphasizes the mathematical structure used to scramble data so that only a specific key can unscramble it?
Cipher block
Hash function
Encryption algorithm
Digital signature
Encryption algorithm
Overall explanation:
OBJ: 1.4 - An encryption algorithm provides a structured method for converting plaintext into ciphertext. A good algorithm ensures data remains confidential and secure from unauthorized access. Digital signatures validate the authenticity and integrity of a message or document, ensuring it hasn’t been tampered with since being signed. A cipher block refers to a fixed-size portion of data that an encryption algorithm processes. It doesn’t define the mathematical method itself. A hash function takes input and returns a fixed-size string, typically used for verifying data integrity, but it does not encrypt data for the purpose of confidentiality.
Domain:
General Security Concepts
Why might an organization be particularly concerned about introducing automation tools that become single points of failure during secure operations?
Issues related to system scalability and slow authentication.
Potential gaps in maintaining data integrity.
Challenges in upholding data confidentiality.
Compromised availability leading to operational disruptions.
Compromised availability leading to operational disruptions.
Overall explanation:
OBJ: 4.7 - A single point of failure can jeopardize the entire system’s uptime, introducing potential security risks and halting processes. Upholding data confidentiality is a primary security concern, but it isn’t directly related to the risks of single points of failure. Data integrity ensures data remains accurate and consistent over its lifecycle, but it doesn’t directly link to concerns of single points of failure. Scalability ensures systems can handle growth, but it isn’t focused on the immediate availability risks associated with single points of failure.
Domain:
Security Operations
Which of the following characteristics of a cloud architecture model describes a model that can quickly recover from failures due to adverse conditions?
Ease of Deployment
Scalability
Resilience
Availability
Resilience
Overall explanation:
OBJ: 3.1 - Resilience in cloud architecture refers to the ability of the system to quickly recover from failures and maintain operational performance, crucial for ensuring availability during adverse conditions. Availability refers to guaranteeing a system will continue to operate so that the system can be used regardless of conditions. Resilience, like availability, refers to keeping a system functioning, but also directly addresses how quickly a system can recover after adverse conditions have led to a failure. Scalability means that the system can expand when more resources are needed without creating lags or problems for users. This expansion isn’t considered an adverse condition. Increased business is seen as a positive attribute. Resilience is the ability of a system to quickly recover after failures due to adverse conditions. Ease of Deployment means that new instances and the entire cloud environment can be easily created. Resilience is the ability to maintain operational performance and recover quickly from failures.
Domain:
Security Architecture
Which of the following are hardware issues that result from products that are no longer being made or supported, but are still usable?
Hardware tampering
Hardware cloning
Legacy vulnerability
End-of-life vulnerability
Legacy vulnerability
Overall explanation:
OBJ: 2.3 - End-of-life vulnerability can allow a hardware attack that involves exploiting vulnerabilities in devices that are no longer supported or updated by the manufacturer. It can allow an attacker to compromise the security or functionality of the device, or use it as a gateway to access other systems or networks. A legacy vulnerability may allow an attack that involves exploiting vulnerabilities in devices that are outdated or obsolete, but still in use. It can allow an attacker to compromise the security or functionality of the device, or use it as a gateway to access other systems or networks. Hardware tampering is a hardware attack that involves physically altering or damaging hardware devices to compromise their functionality, performance, or security. It can allow an attacker to install malware, backdoors, spyware, or vulnerabilities on the device. Hardware cloning is a hardware attack that involves creating unauthorized copies of hardware devices to counterfeit their functionality, performance, or security. It can allow an attacker to sell fake products, steal intellectual property, or bypass authentication mechanisms.
Domain:
Threats, Vulnerabilities, and Mitigations
Clumsy Contraptions Engineering is seeking to change its security footing. In the past, they have found that too many pieces of malicious software have gotten past the system. Their Chief Security Officer believes they need a device which will actively evaluate traffic and reject or modify packets according to policies the company sets. What type of device is the CSO suggesting?
Inline
Fail-close
SASE
Remote Access
Inline
Overall explanation:
OBJ: 3.2 - Inline devices are designed to interact with network traffic actively and can take actions such as accepting, rejecting, or modifying packets, making them the optimal choice for this scenario. Secure Access Service Edge (SASE) is a form of cloud architecture that combines a number of services as a single service. By providing services like Software-defined wide are network (SD-WAN), firewalls as a service, secure web gateways, and zero-trust network access, SASE will reduce cost and simplify management while improving security. The integrated nature of the architecture means the technologies used will work together efficiently. It may include a packet analyzer, but that isn’t the focus of the architecture. Fail-close refers to what happens when a network encounters errors and exceptions. Fail-close means that when errors occur or exceptions are encountered, the system denies further access. This prevents any further network traffic until the error or exception are dealt with. While this provides greater security, it means that a website can’t be accessed even if the error encountered is minor or doesn’t pose a security threat. This is a response to errors and exceptions, it doesn’t read and interact with packets. Remote access allows users to connect to a network or a device from a distant location, but it does not pertain to actively interacting with network traffic to reject or modify packets.
Domain:
Security Architecture
When considering user interactions with a web service, which of the following are the security measures that involve the secure creation and transfer of identifiers as well as enforcing inactivity limits to prevent unauthorized access?
Timeout policies
Session management
Token handling
Session cookies
Session management
Overall explanation:
OBJ: 5.1 - These refer to the protocols that maintain the security of user interactions on the web, including the secure creation and transfer of unique identifiers or “cookies,” and setting inactivity limits to automatically terminate the session if the user is inactive for a certain period. Timeout policies contribute to these practices by defining when an inactive session should end, but they do not include the secure transmission and generation of identifiers. Token handling involves managing security tokens within a system, but on its own, it doesn’t cover all aspects of what is required to maintain the security of user interactions, including setting inactivity limits. While session cookies are a part of what is managed, this term alone does not encompass the full scope of practices like setting inactivity limits.
Domain:
Security Program Management and Oversight
Which of the following terms refers to a critical predictive metric that organizations monitor to foresee potential risks and their impact on operations?
Key risk indicators
Risk parameters
Risk metrics
Risk threshold
Key risk indicators (KRI)
Overall explanation:
OBJ: 5.2 - KRIs are metrics that provide early warnings of increasing risk exposures, enabling organizations’ leadership to manage these risks proactively. A risk threshold is the defined level of risk an organization is willing to accept, not a predictive indicator. Risk metrics are quantitative measures of risk but do not specifically refer to the predictive indicators used for monitoring potential risks. Risk parameters are specific variables used within risk assessment processes, not predictive indicators.
Domain:
Security Program Management and Oversight
Which of the following statements BEST explains the importance of environmental variables in regard to vulnerability management?
Environmental variables refer to the unique characteristics of an organization’s infrastructure that can affect vulnerability assessments and risk analysis.
Environmental variables are factors that impact the physical security of an organization’s premises.
Environmental variables are parameters used in vulnerability scanning tools to assess the security posture of an organization’s network and infrastructure.
Environmental variables are specific conditions that trigger an automated response when a vulnerability is detected in an organization’s systems.
Environmental variables refer to the unique characteristics of an organization’s infrastructure that can affect vulnerability assessments and risk analysis.
Overall explanation:
OBJ: 4.3 - Environmental variables refer to the unique characteristics of an organization’s infrastructure, business environment, and operational context that can impact vulnerability assessments and risk analysis. Understanding these variables is crucial to conducting effective vulnerability management and developing appropriate risk mitigation strategies. These variables are not specific conditions triggering automated responses; rather, they are factors related to an organization’s infrastructure and business environment that impact vulnerability management processes. While vulnerability scanning tools may use various parameters, environmental variables refer to different aspects related to an organization’s infrastructure and business environment. While physical security factors are important, environmental variables in this context have a different focus.
Domain:
Security Operations