Random Question 20 - 40 Flashcards
CompTIA Security+ SY0-701 Part 1
Question 21:
A security analyst is reviewing the following firewall configuration snippet:
“*yaml
- action: allow
source: 192.168.1.0/24
destination: any
service: ssh
- action: deny
- source: any
- destination: 10.0.0.5
service: http
…
Which TWO of the following statements accurately describe the effects of this configuration?
A. SSH connections from the 192.168.1.0/24 network are permitted to any destination.
B. All HTTP traffic to the IP address 10.0.0.5 is blocked.
C. The firewall allows all incoming SSH connections.
D. HTTP connections from 10.0.0.5 are denied to any destination.
E. The configuration prevents all traffic to the 10.0.0.0/24 network.
Correct Answer: A, B
Explanation:
The first rule (A) allows SSH connections from the 192.168.1.0/24 network to any destination.
The second rule (B) denies all HTTP traffic to the specific IP 10.0.0.5. Options C, D, and E are incorrect interpretations of the given configuration.
Question 22:
In the context of a Zero Trust security model, which of the following best describes the relationship between the Control Plane and the Data Plane?
A. The Control Plane manages user authentication, while the Data Plane handles data encryption.
B. The Control Plane defines security policies, while the Data Plane enforces those policies on network traffic.
C. The Control Plane is responsible for physical security, while the Data Plane manages digital assets.
D. The Control Plane handles north-south traffic, while the Data Plane manages east-west traffic.
Correct Answer: B
Explanation: In a Zero Trust model, the Control Plane is responsible for defining security policies and making access decisions, while the Data Plane enforces these policies on actual network traffic and data flow.
Question 23:
An organization has implemented a comprehensive security awareness program. Despite this, they experience a successful whaling attack where the CFO is tricked into transferring a large sum of money to a fraudulent account. During the incident response, which of the following should be the FIRST step in the “Lessons Learned” phase?
A. Conduct a root cause analysis of the incident.
B. Update the security awareness training materials.
C. Implement stricter email filters and verification processes.
D. Discipline the CFO for falling for the attack.
** Correct Answer: A **
Explanation: The first step should be to conduct a root cause analysis. This helps understand how the attack succeeded despite existing measures, informing subsequent improvements to security processes and training.
01 - Conduct Root Cause Analysis
02 - Identify Vulnerbilities
03 - Update Security Processes
04 - Revise Training Programs
05 - Implmenet Improved Measures
Question 24:
A security analyst is reviewing the following YAML configuration for a cloud-based security control:
*yaml
policy:
enforce: true
actions:
- encrypt_data
- log_access
conditions:
location: “!= internal_network”
data_type: “sensitive”
Which TWO of the following statements accurately describe the effects of this configuration?
A. The policy encrypts sensitive data when accessed from outside the internal network.
B. All data access is logged regardless of the user’s location.
C. The policy is applied only to data classified as sensitive.
D. Data encryption occurs for all access attempts, both internal and external.
E. The policy enforces encryption but does not log access for sensitive data.
**Correct Answer: A, C **
Explanation: The configuration enforces encryption and logging for sensitive data (C) when accessed from outside the internal network (A). It doesn’t apply to all data or all locations, and it does include logging, contrary to options B, D, and E.
Question 25:
In the context of physical security measures, which of the following combinations would be most effective in preventing tailgating at a high-security facility’s main entrance?
A. Bollards and fencing
B. Access control vestibule and pressure sensors
C. Video surveillance and lighting
D. Security guard and access badges
Correct Answer: B
Explanation: An access control vestibule (mantrap) combine with pressure sensors is the most effective in preventing tailgating. The vestibule ensures only one person enters at time, while pressure sensors can detect if more than one person is present in the
Question 26:
A company implements a new security awareness program focusing on social engineering threats. Which of the following metrics would be MOST effective in measuring the program’s impact on the organization’s security posture?
A. Number of employees who completed the training
B. Reduction in successful phishing attempts reported by the IT department
C. Increase in password complexity across user accounts
D. Frequency of security policy updates
Correct Answer: B
Explanation: The reduction in successful phishing attempts directly measures the effectiveness of the social engineering awareness program. It shows the practical application of the knowledge gained, unlike options A, C, and D, which don’t directly correlate with improved resilience against social engineering threats.
Question 27:
A security team is implementing a new intrusion detection system (IDS) in their network. They want to ensure it can detect both known and unknown threats while minimizing false positives. Which TWO of the following configurations would be most effective in achieving this goal?
A. Implement signature-based detection for known threats.
B. Enable anomaly-based detection for identifying unusual network behavior.
C. Configure the IDS to block all traffic from external networks.
D. Set up honeypots within the network to attract and study potential attackers.
E. Disable all alerts for internal network traffic.
Correct Answer: A, B
Explanation: Signature-based detection (A) effectively identifies known threats, while anomaly-based detection
(B) can catch unknown or zero-day threats by identifying unusual behavior. This combination provides comprehensive coverage while minimizing false positives
Question 28:
An organization is implementing a Zero-Trust architecture. Which of the following best describes how the principle of least privilege should be applied in this context?
A. Grant users full access to all resources and monitor their activities closely.
B. Provide access to all resources but require multi-factor authentication for each access attempt.
C. Grant minimal access rights necessary for users to perform their job functions and regularly review these permissions.
D. Deny all access requests by default and manually approve each request as needed.
Correct Answer: C
Explanation: In a Zero Trust model, the principle of least privilege means granting users only the minimum access rights needed for their roles (C). This approach reduces the attack surface while still allowing necessary functionality, unlike the other options which are either too permissive or
Question 9:
A security analyst is reviewing the following log entry from a web application firewall:
‘json
“timestamp”: “2024-12-21T15:30:22Z”,
“source_ip”: “203.0.113.15”,
“request _uri”: “/admin/config.php?action=view&id=1 OR 1=1”
“user _agent”: “Mozilla/5.0”,
“status_code”: 403
What type of attack was likely attempted, and what was the outcome?
A. Cross-Site Scripting (XSS) attack, successfully blocked
B. SQL Injection attempt, successfully blocked
C. Directory Traversal attack, the attack succeeded
D. Buffer Overflow exploit, attack
Correct Answer: B
Explanation: The log shows an SQL Injection attempt (“OR 1=1” in the URI) which was blocked by the firewall (status code 403 indicates “Forbidden”). This demonstrates successful mitigation of a common web application
Question 20:
A security analyst is reviewing the following YAML configuration for a cloud-based access control policy:
*yaml
policy:
name: “Sensitive_Data_Access”
rules:
- condition:
user _group: “executives” time: “business_hours”
allow: true
- condition:
data_classification: “confidential”
location: “!= office_network”
allow: false
…
Which TWO of the following allow: false .
A. Executives can access sensitive data only during business hours.
B. All users are denied access to confidential data from outside the office network.
C. The policy allows unrestricted access to sensitive data for executives.
D. Non-executive users can access confidential data from the office network.
E. The policy prevents all remote access to company data.
**Correct Answer: A, B **
Explanation: The configuration allows executives to access sensitive data during business hours (A) and denies access to confidential data from outside the office network for all users (B).
It doesn’t grant unrestricted access to executives doesn’t specifically allow non-executives to access confidential data on-site, and doesn’t prevent all remote
Question 21:
An organization is implementing a comprehensive third-party risk management program. Which of the following actions would be MOST effective in continuously monitoring and mitigating risks associated with third-party vendors?
A. Conducting annual security audits of all third-party vendors.
B. Implementing real-time monitoring of third-party access to internal systems.
C. Requiring vendors to sign a yearly compliance statement.
D. Limiting all third-party access to non-critical systems only.
**Correct Answer: B **
Explanation: Real-time monitoring of third-party access provides continuous visibility into potential risks and allows for immediate response to suspicious activities.
This approach is more effective than periodic audits, compliance statements, or blanket access restrictions in managing ongoing third-party risks.
Question 22:
In the context of deception and disruption technologies, which of the following best describes the primary difference between a honeypot and a honeytoken?
A. A honeypot is a physical decoy system, while a honeytoken is a virtual decoy.
B. A honeypot contains real data, while a honeytoken contains fake data.
C. A honeypot is a network of decoy systems, while a honeytoken is a single decoy file or resource.
D. A honeypot is used for external threats, while a honeytoken is used for internal threats only.
Correct Answer: C
Explanation: A honeypot is typically a decoy system or network designed to attract attackers, while a honeytoken is a specific piece of fake data (like a database entry or file) used to detect unauthorized access or data breaches. The key difference is in their scope and implementation.
Question 23:
A security analyst is reviewing the following intrusion detection system (IDS)
rule:
’’’
alert tcp any any -> 192.168.1.0/24 80 (msg:”Potential SQL Injection”;
content:”%27”; sid: 1000001;)
‘’’
Which TWO of the following statements accurately describe the functionality of this rule?
A. It generates an alert for all HTTP traffic to the 192.168.1.0/24 network.
B. The rule detects potential SQL injection attempts containing a single quote (%27).
C. It blocks all traffic containing the string “%27” to port 80.
D. The rule applies to both incoming and outgoing traffic on the network.
E. It only alerts on TCP traffic destined for port 80 on the specified network.
Correct Answer: B, E
Explanation: The rule detects potential SQL injection attempts by looking for the encoded single quote (%27) in TCP traffic (B) specifically destined for port 80 on the 192.168.1.0/24 network (E). It doesn’t block traffic or apply to all HTTP traffic, and it’s not bidirectional.
Question 24:
In the context of cloud security and shared responsibility models, which of the following is typically the cloud service provider’s responsibility in a Platform as a Service (PaaS) deployment?
A. Configuring application-level access controls.
B. Patching and updating the underlying operating system.
C. Encrypting data at rest within the application.
D. Managing user authentication for custom applications.
Correct Answer: B
Explanation: In a PaaS model, the cloud service provider is typically responsible for maintaining and patching the underlying infrastructure, including the operating system.
The customer is responsible for the applications and data, including access controls, encryption, and user
Question 25:
An organization is implementing a new security awareness training program. Which of the following metrics would be MOST effective in measuring the long-term impact of the program on the organization’s security posture?
A. Number of employees who completed the training modules
B. Average score on post-training quizzes
C. Reduction in successful social engineering attacks over time
D. Increase in reported security incidents by employees
**Correct Answer: C **
Explanation: A reduction in successful social engineering attacks over time directly demonstrates the effectiveness of the awareness program in improving the organization’s security posture. This metric shows practical application of knowledge, unlike completion rates or quiz scores, and is more indicative of positive change than an increase in reported incidents.
Question 26:
Your organization is implementing a zero trust architecture. You’re tasked with configuring the control plane for a critical application. Which two of the following JSON configurations would best align with zero trust principles? (Choose two)
{
“authentication”: “multi-factor”,
“authorization”: “least-privilege”
“data_encryption”: “end-to-end”,
“network_segmentation”: “micro-segmentation”,
“monitoring”: “continuous”
}
Options:
A. “authentication”: “multi-factor” and “authorization”: “role-based”
B. “data_encryption”: “end-to-end” and “network_segmentation”: “micro-segmentation”.
C. “authentication”: “single-factor” and “monitoring”: “periodic”.
D. “authorization”: “least-privilege” and “monitoring”: “continuous”.
E. “network_segmentation”: “perimeter-based” and “data _encryption”: “at-rest-only”.
Correct Answer: B, D
Explanation: In a zero trust model, end-to-end encryption (B) ensures data security throughout its lifecycle, while micro-segmentation (B) minimizes the attack surface. Least-privilege authorization (D) and continuous monitoring (D) are also crucial zero trust principles, providing strict access control and real-time threat detection.