Security+ Flashcards
The organization that Chris works for has disabled automatic updates. What is the most common reason for disabling automatic updates for organizational systems?
A. To avoid disruption of the work process for office workers
B. To prevent security breaches due to malicious patches and updates
C. To avoid issues with problematic patches and updates
D. All of the above
C. The most common reason to disable automatic patching is to avoid issues with problematic or flawed patches and updates. In most environments the need to patch regularly is accepted and handled for office workers without causing significant disruption. That concern would be different if the systems being patched were part of an industrial process or factory production environment. Malicious patches from legitimate sources such as an automatic update repository are exceptionally rare and are not a common concern or driver of this behavior. For more information, see Chapter 11.
Which of the following is the least volatile according to the forensic order of volatility?
A. The system’s routing table
B. Logs
C. Temp files
D. CPU Registers
B. Logs, along with any file that is stored on disk without the intention of being frequently overwritten, are the least volatile item listed. In order from most volatile to least from the answers here, you could list these as CPU registers, the system’s routing table, temp files, and logs. For more information, see Chapter 15.
Ed wants to trick a user into connecting to his evil twin access point (AP). What type of attack should he conduct to increase his chances of the user connecting to it?
A. A disassociation attack
B. An application denial-of-service attack
C. A known plain-text attack
D. A network denial-of-service attack
A. If Ed can cause his target to disassociate from the access point they are currently connected to, he can use a higher transmission power or closer access point to appear higher in the list of access points. If he is successful at fooling the user or system into connecting to his AP, he can then conduct on-path attacks or attempt other exploits. Denial-of-service attacks are unlikely to cause a system to associate with another AP, and a known plain-text attack is a type of cryptographic attack and is not useful for this type of attempt. For more information, see Chapter 12.
What term is used to describe wireless site surveys that show the relative power of access points on a diagram of the building or facility?
A. Signal surveys
B. db maps
C. AP topologies
D. Heatmaps
D. Site surveys that show relative power on a map or diagram are called heatmaps. They can help show where access points provide a strong signal, and where multiple APs may be competing with each other due to channel overlap or other issues. They can also help identify dead zones where signal does not reach. Signal surveys, db maps, and AP topologies were made up for this question. For more information, see Chapter 13.
What hardware device is used to create the hardware root of trust for modern desktops and laptops?
A. System memory
B. A HSM
C. The CPU
D. The TPM
D. A hardware root of trust provides a unique element that means that a board or device cannot be replicated. A Trusted Platform Module (TPM) is commonly used to provide the hardware root of trust. CPUs and system memory are not unique in this way for common desktops and laptops, and a hardware security module (HSM) is used to create, manage, and store cryptographic certificates as well as perform and offload cryptographic operations. For more information, see Chapter 11.
Angela wants to prevent users in her organization from changing their passwords repeatedly after they have been changed so that they cannot reuse their current password. What two password security settings does she need to implement to make this occur?
A. Set a password history and a minimum password age.
B. Set a password history and a complexity setting.
C. Set a password minimum and maximum age.
D. Set password complexity and maximum age.
A. Angela needs to retain a password history and set a minimum password age so that users cannot simply reset their password until they have changed the password enough times to bypass the history. For more information, see Chapter 8.
Chris wants to establish a backup site that is fully ready to take over for full operations for his organization at any time. What type of site should he set up?
A. A cold site
B. A clone site
C. A hot site
D. A ready site
C. Hot sites are ready to take over operations in real time. Cold sites are typically simply ready buildings with basic infrastructure in place to set up a site. Clone sites and ready sites are not typical terms used in the industry. For more information, see Chapter 9.
Which of the following is not a common constraint of embedded and specialized systems?
A. Computational power
B. Overly complex firewall settings
C. Lack of network connectivity
D. Inability to patch
B. Embedded and specialized systems tend to have lower-power CPUs, less memory, less storage, and often may not be able to handle CPU-intensive tasks like cryptographic algorithms or built-in security tools. Thus, having a firewall is relatively unlikely, particularly if there isn’t network connectivity built in or the device is expected to be deployed to a secure network. For more information, see Chapter 11.
Gary is reviewing his system’s SSH logs and sees logins for the user named “Gary” with passwords like password1, password2 … PassworD. What type of attack has Gary discovered?
A. A dictionary attack
B. A rainbow table attack
C. A pass-the-hash attack
D. A password spraying attack
A. A dictionary attack will use a set of likely passwords along with common variants of those passwords to try to break into an account. Repeated logins for a single user ID with iterations of various passwords is likely a dictionary account. A rainbow table is used to match a hashed password with the password that was hashed to that value. A pass-the-hash attack provides a captured authentication hash to try to act like an authorized user. A password spraying attack uses a known password (often from a breach) for many different sites to try to log in to them. For more information, see Chapter 4.
Kathleen wants to set up a system that allows access into a high-security zone from a low-security zone. What type of solution should she configure?
A. VDI
B. A container
C. A screened subnet
D. A jump server
D. Jump servers are systems that are used to provide a presence and access path in a different security zone. VDI is a virtual desktop infrastructure and is used to provide controlled virtual systems for productivity and application presentation among other uses. A container is a way to provide a scalable, predictable application environment without having a full underlying virtual system, and a screened subnet is a secured zone exposed to a lower trust level area or population. For more information, see Chapter 12.
Derek’s organization is worried about a disgruntled employee publishing sensitive business information. What type of threat should Derek work to protect against?
A. Shoulder surfing
B. Social engineering
C. Insider threats
D. Phishing
C. Derek’s organization is worried about insider threats, or threats that are created by employees and others who are part of the organization or are otherwise trusted by the organization. Social engineering involves deceiving people to achieve an attacker’s goals. Phishing attempts to acquire personal information through social engineering and other techniques, and shoulder surfing is a technique where malicious actors watch over someone’s shoulder to acquire information like passwords or credit card numbers. For more information, see Chapter 2.
Jeff is concerned about the effects that a ransomware attack might have on his organization and is designing a backup methodology that would allow the organization to quickly restore data after such an attack. What type of control is Jeff implementing?
A. Corrective
B. Preventive
C. Detective
D. Deterrent
A. Corrective controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a corrective control. Preventative controls attempt to stop future issues. Detective controls focus on detecting issues and events, and deterrent controls attempt to deter actions. For more information, see Chapter 1.
Samantha is investigating a cybersecurity incident where an internal user used his computer to participate in a denial-of-service attack against a third party. What type of policy was most likely violated?
A. BPA
B. SLA
C. AUP
D. MOU
C. This activity is almost certainly a violation of the organization’s acceptable use policy (AUP), which should contain provisions describing appropriate use of networks and computing resources belonging to the organization. BPA is not a common term in this context. Service level agreements (SLAs) determine an agreed upon level of service, and MOUs, or memorandums of understanding are used to document agreements between organizations. See Chapter 16 for more information.
Jean recently completed the user acceptance testing process and is getting her code ready to deploy. What environment should house her code before it is released for use?
A. Test
B. Production
C. Development
D. Staging
D. The staging environment is a transition environment for code that has successfully cleared testing and is waiting to be deployed into production. This is where the code should reside before it is released for use. The development environment is where developers work on the code prior to preparing it for deployment. The test environment is where the software or systems can be tested without impacting the production environment. The production environment is the live system. Software, patches, and other changes that have been tested and approved move to production. For more information, see Chapter 6.
Rob has created a document that describes how staff in his organization can use organizationally owned devices, including if and when personal use is allowed. What type of policy has Rob created?
A. Change management policy
B. Acceptable use policy
C. Access control policy
D. Playbook
B. Acceptable use policies define how organizational systems, devices, and services can and should be used. Change management policies determine how an organization handles change and change control. Access control documentation is typically handled as a standard, and playbooks describe how perform specific duties or processes.
Oren obtained a certificate for his domain covering *.acmewidgets.net. Which one of the following domains would not be covered by this certificate?
A. www.acmewidgets.net
B. acmewidgets.net
C. test.mail.acmewidgets.net
D. mobile.acmewidgets.net
C. Wildcard certificates protect the listed domain as well as all first-level subdomains. test.mail.acmewidgets.net is a second-level subdomain of acmewidgets.net and would not be covered by this certificate. For more information, see Chapter 7.
Richard is sending a message to Grace and would like to apply a digital signature to the message before sending it. What key should he use to create the digital signature?
A. Richard’s private key
B. Richard’s public key
C. Grace’s private key
D. Grace’s public key
A. The sender of a message may digitally sign the message by encrypting a message digest with the sender’s own private key. For more information, see Chapter 7.
Andrew is employing which type of risk management strategy as he works with his financial team to purchase a cybersecurity insurance policy to cover the financial impact of a data breach?
A. Risk avoidance
B. Risk transference
C. Risk acceptance
D. Risk mitigation
B. Purchasing insurance is the most common example of risk transference—shifting liability to a third party. Avoidance involves efforts to prevent the risk from occurring, acceptance is just that—formally accepting that the risk may occur, and mitigation attempts to limit the impact of the risk. For more information, see Chapter 17.
Shelly is writing a document that describes the steps that incident response teams will follow upon first notice of a potential incident. What type of document is she creating?
A. Guideline
B. Standard
C. Procedure
D. Policy
C. Procedures provide checklist-style sets of step-by-step instructions guiding how employees should react in a given circumstance. Procedures commonly guide the early stages of incident response. Standards define how policies should be implemented. Guidelines are voluntary, whereas policies are mandatory. For more information, see Chapter 16.
Define control objectives
The specific goals or intended outcomes of implementing certain security measures or controls. These objectives are crucial for ensuring the confidentiality, integrity, and availability of information systems and data.
Define security controls
Specific measures that fulfill the security objectives of an organization.
Define gap analysis
A method used to assess the difference between the current state of security measures and the desired state. It involves identifying the existing controls within an organization’s security posture and comparing them against industry standards or best practices.
What are the security control categories?
- Technical controls enforce confidentiality, integrity, and availability in the digital space. Examples of technical security controls include firewall rules, access control lists, intrusion prevention systems, and encryption.
- Operational controls include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management.
- Managerial controls are procedural mechanisms that focus on the mechanics of the risk management process. Examples of administrative managerial controls include periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices.
- Physical controls are security controls that impact the physical world. Examples of physical security controls include fences, perimeter lighting, locks, fire suppression systems, and burglar alarms.
What are the security control types?
- Preventive controls intend to stop a security issue before it occurs. Firewalls and encryption are examples of preventive controls.
- Deterrent controls seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of deterrent controls.
- Detective controls identify security events that have already occurred. Intrusion detection systems are detective controls.
- Corrective controls remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a corrective control.
- Compensating controls are controls designed to mitigate the risk associated with exceptions made to a security policy. Think a necessary, but outdated OS device running in an isolated network.
- Directive controls inform employees and others what they should do to achieve security objectives. Policies and procedures are examples of directive controls.