Security Flashcards
Objective 6
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A. Hardware failure
B. Denial of service
C. On-path attack
D. Social engineering
B. Denial of Service
availability concern
A denial of service (DoS) attack occurs when a server or network resource is overwhelmed with more requests or traffic than it can handle, resulting in legitimate users being unable to access the service. In this scenario, the server received more requests than it could handle, leading to the outage and preventing customers from logging in. This is consistent with the characteristics of a denial of service attack.
Which of the following best explains the reason for password expiration?
A. To disable unused user IDs
B. To invalidate any compromised passwords
C. To discourage writing down passwords
D. To enforce new password complexity rules
B. To invalidate any compromised passwords
The primary reason for password expiration is to enhance security by ensuring that passwords are regularly changed, thereby reducing the risk associated with compromised passwords. If a password is compromised (e.g., through a data breach or social engineering attack), the expiration policy ensures that the compromised password becomes invalid after a certain period, limiting the window of opportunity for unauthorized access.
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A. Installing a host-based firewall
B. Setting a BIOS password
C. Patching the operating system
D. Removing unnecessary software
B. Setting a BIOS password
Setting a BIOS (Basic Input/Output System) password can prevent unauthorized users from accessing or modifying the BIOS settings, including the boot order. By setting a BIOS password, the IT manager can restrict users’ ability to boot from alternative operating systems or external bootable media without proper authorization.
When a BIOS password is set, users are prompted to enter the password when accessing the BIOS setup utility or attempting to change the boot order. Without the correct password, users cannot modify the BIOS settings, ensuring that the system boots only from the specified operating system installed on the workstation.
Which of the following terms best describes the outcome of a text message that is encrypted from its original form?
A. Cipher
B. Vector
C. Plain
D. Algorithm
A. Cipher
In cryptography, a cipher is an algorithm for performing encryption or decryption. When a text message is encrypted from its original form, it undergoes a process where it is transformed into an unintelligible form using a specific algorithm or cipher. The result of this encryption process is often referred to as the ciphertext. A cipher ensures that the original message is protected from unauthorized access or interception by converting it into a format that can only be understood by authorized parties who possess the appropriate decryption key.
An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?
A. Phishing attack
B. Social engineering
C. On-path attack
D. Eavesdropping
B. Social Engineering
gain trust to gain entry/ info
Social engineering involves manipulating individuals into divulging confidential information or performing actions that compromise security. In the scenario described, the attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. This type of attack relies on psychological manipulation rather than technical exploits. The attacker may use various tactics such as impersonation, pretexting, or building a rapport with the target to deceive them into providing access or sensitive information
A small company lacks the resources to properly verify a user’s identity when the user calls in for technical support. To which of the following is the company susceptible?
A. Wiretapping
B. On-path attack
C. Snooping
D. Social engineering
D. Social Engineering
Social engineering involves manipulating individuals into divulging confidential information or performing actions that compromise security. In this scenario, the small company lacks the resources to properly verify a user’s identity during technical support calls. This vulnerability can be exploited by attackers using social engineering techniques to deceive support staff into providing unauthorized access or sensitive information.
Which of the following creates multifactor authentication when used with something you have?
A. Single sign-on
B. Hardware token
C. Geolocation
D. Password
D. Password
Multifactor authentication (MFA) requires users to provide two or more authentication factors to verify their identity. One common factor is “something you have,” which typically refers to a physical token or device that the user possesses. A hardware token is a physical device that generates one-time passwords or codes that are used as part of the authentication process. When combined with a password (something you know), a hardware token creates multifactor authentication, providing an additional layer of security beyond just a password.
A corporate network just implemented a 60-day password-warning banner. Which of the following is most likely going to happen in 60 days?
A. Password reset
B. Password expiration
C. Password reuse
D. Password implementation
B. Password expiration
When a corporate network implements a 60-day password-warning banner, it typically means that passwords will expire after 60 days. Users will receive a warning notification when their passwords are about to expire, prompting them to change their passwords within the specified time frame.
Employees must use a badge to enter and exit the building. Each time the badge is used, a log entry is created and stored to record who has entered and exited the building. Which of the following best describes what the log entries provide?
A. Automation
B. Accounting
C. Authorization
D. Authentication
B. Accounting
a log entry is created, what best describes the log = accounting
The log entries maintain a record of who has entered and exited the building, essentially serving as an accounting mechanism for tracking individuals’ movements. This information can be used for various purposes such as attendance tracking, security auditing, and ensuring compliance with access policies.
Which of the following are benefits of a security awareness training program? (Choose two.)
A. Enhances overall security
B. Provides information on how to avoid phishing
C. Lowers the incidence of hardware failures
D. Increases the availability of computers
E. Advances end users’ technical skills
F. Creates IT security opportunities for end users
A.Enhances overall security
B. Provides information on how to avoid phishing
Security awareness training programs educate employees about cybersecurity best practices, threats, and risks, leading to improved awareness and understanding of security measures. This enhanced awareness contributes to overall security by empowering employees to recognize and mitigate potential security threats effectively. Phishing attacks are a common and significant threat to organizational security. Security awareness training programs typically include guidance on identifying phishing attempts, understanding common phishing techniques, and adopting preventive measures to avoid falling victim to phishing scams. This knowledge helps employees recognize suspicious emails, links, or messages and reduces the likelihood of successful phishing attacks.
A user is trying to set up a new wireless access point. Which of the following should the user do first?
A. Change the SSID to a unique name.
B. Change the default password.
C. Enable WPA2 encryption.
D. Enable the highest available wireless standard.
B. Change the default password
do first always
This should be the first step because leaving the default password unchanged poses a security risk. Default passwords are well-known and easily exploited by attackers. Changing the password helps prevent unauthorized access to the access point’s settings and network.
Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?
A. Only the attempts to access unapproved URLs are logged.
B. All internet usage is logged by a corporate server and may be monitored live.
C. All internet browsing is private and anonymous.
D. Only the attempts to access sites that include prohibited keywords are logged.
B. All internet usage is logged by a corporate server and may be monitored live.
In a corporate environment, it is common for companies to log and monitor employees’ internet usage for various reasons, including security, compliance, and productivity monitoring. This level of monitoring allows the company to track employee activities, enforce acceptable use policies, detect potential security threats, and ensure compliance with regulations. Employees should expect that their internet activities, including visited websites, accessed content, and online communications, may be logged and monitored by the corporate IT department or security team.
An administrator is creating accounts based on departments within the company. Which of the following access models does this BEST represent?
A. Non-discretionary access
B. Mandatory access
C. Discretionary access
D. Role-based access
D. Role-based access
based on departments
In a role-based access control (RBAC) model, access to resources is determined based on the roles or responsibilities of users within an organization. Users are assigned specific roles, and permissions are associated with these roles. When users belong to a particular department, they are assigned roles corresponding to that department, and their access rights are determined based on those roles. This approach simplifies access management, improves security, and ensures that users have appropriate access to resources based on their organizational roles.
A user from the accounting department received a call asking for hardware and software information. To which of the following is this user being exposed?
A. Eavesdropping
B. Impersonation
C. Phishing
D. Whaling
B. Impersonation
Integrity concern
Impersonation occurs when an attacker pretends to be someone else, such as a trusted individual or representative of a legitimate organization, to deceive the victim into providing sensitive information or performing actions that compromise security. In this scenario, the caller may be impersonating a legitimate representative or authority figure to gain access to hardware and software information from the user.
Which of the following may be prevented by adding locks and video cameras to the refuse collection location?
A. Eavesdropping
B. Social engineering
C. Tailgating
D. Dumpster diving
D. Dumpster Diving
Dumpster diving is the practice of searching through dumpsters or trash bins to find discarded items, often for the purpose of obtaining sensitive information or valuable materials. Adding locks and video cameras to the refuse collection location can help prevent unauthorized individuals from accessing the dumpsters or trash bins, thereby reducing the risk of dumpster diving.