Security + Videos Flashcards

Pass the First Time

1
Q

Which are common solutions that can contribute to a data loss prevention initiative? Select all that apply.
A. Cloud access security brokers (CASB)
B. Database activity monitors (DAM)
C. Intrusion detection systems (IDS)
D. Secure email gateways (SEG)
E. Endpoint detection and response (EDR)
F. Access control lists (ACL)

A

A. Cloud Access Security Brokers (CASB) B. Database Activity Monitors (DAM) D. Secure Email Gateways (SEG) E. Endpoint Detection and Response (EDR)
Explanation:
A. Cloud Access Security Brokers (CASB): Provide visibility and control over data in cloud services, ensuring compliance and protecting against data leaks.
B. Database Activity Monitors (DAM): Monitor and analyze database activities to detect unauthorized access and prevent data breaches.
D. Secure Email Gateways (SEG): Protect emails from threats like phishing and data leaks, ensuring secure communication.
E. Endpoint Detection and Response (EDR): Monitor endpoints for suspicious activities and potential data exfiltration, enabling quick responses to threats.
Not Primarily Focused on DLP:
C. Intrusion Detection Systems (IDS): Detect intrusions and malicious activities but are more focused on network security rather than direct data loss prevention.
F. Access Control Lists (ACL): Define permissions for who can access resources but are more about access management rather than comprehensive DLP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which port does LDAPS use?
A. 993
B. 443
C. 636
D. 389

A

C. 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Internet service facilitates signature validation authentication using additional extensible record types?
A. DNSSEC
B. IPsec for IPv6
C. OpenDNS
D. TLS 1.3

A

A. DNSSEC
DNSSEC (Domain Name System Security Extensions) indeed facilitates signature validation and authentication by adding cryptographic signatures to DNS records. This ensures the authenticity and integrity of DNS data, protecting against DNS spoofing and other attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which initiative is typically supported by IEEE 802.11X port-based network access control (PNAC) on Layer 2 and Layer 3 networks?
A. Virtual private networking (VPN)
B. Network admission control (NAC)
C. Privilege access management (PAM)
D. Domainkeys identified mail (DKIM)

A

B. Network admission control (NAC)
Explanation:
IEEE 802.1X is a port-based network access control standard that is commonly used to enhance network security by ensuring that only authorized devices can connect to the network. This is a key component of Network Admission Control (NAC), which encompasses various technologies and policies aimed at controlling access to network resources.
Why IEEE 802.1X and NAC?:
Authentication: Ensures that devices and users are authenticated before they are granted network access.
Authorization: Determines what resources an authenticated device or user can access.
Network Integrity: Helps maintain the integrity of the network by preventing unauthorized access and potentially harmful devices.
Why the Other Options Are Less Relevant:
A. Virtual Private Networking (VPN): VPNs provide secure remote access to a network but are not directly related to port-based network access control.
C. Privilege Access Management (PAM): PAM focuses on managing and controlling elevated access permissions, not network access control.
D. DomainKeys Identified Mail (DKIM): DKIM is used for email authentication, not for network access control.
NAC with IEEE 802.1X is all about keeping your network secure by tightly controlling who and what gets on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security service examines operating system files, configuration files, registries, application software, and Linux system files for changes and indicators of compromise?
A. Security information and event monitoring
B. File integrity monitoring
C. Database activity monitoring
D. Reputation filtering

A

B. File integrity monitoring
Explanation:
File Integrity Monitoring (FIM) is a security service designed to examine operating system files, configuration files, registries, application software, and Linux system files for changes and indicators of compromise.
Why FIM?:
Change Detection: Monitors and detects unauthorized changes to critical files and systems.
Indicators of Compromise (IOC): Identifies suspicious activity that may indicate a security breach.
Compliance: Helps meet regulatory requirements by ensuring that systems remain secure and configurations are not tampered with.
Why the Other Options Are Less Suitable:
A. Security Information and Event Monitoring (SIEM):
Collects and analyzes security events from multiple sources but does not specifically focus on file integrity.
C. Database Activity Monitoring (DAM):
Monitors database activities to detect and prevent unauthorized access, not file integrity across the operating system.
D. Reputation Filtering:
Uses known malicious signatures to filter traffic but doesn’t monitor file changes or integrity.
File integrity monitoring is like having a vigilant guard keeping an eye on your system’s vital files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term refers to a network architecture where a single firewall is used with three network interfaces to provide additional protection from outside cyber-attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet?
A. Management VLAN
B. Bastion service
C. Honeynet
D. Screened subnet

A

D. Screened subnet
Explanation:
A screened subnet, also known as a demilitarized zone (DMZ), is a network architecture that uses a single firewall with three network interfaces to create an isolated perimeter network. This provides additional protection from external cyber-attacks by separating the internal network from the public-facing internet.
Key Features of a Screened Subnet (DMZ):
Three Interfaces: The firewall has three network interfaces: one for the internal network, one for the external network (internet), and one for the DMZ.
Isolation: The DMZ contains public-facing services (like web servers) while the internal network remains isolated and protected.
Controlled Access: The firewall enforces strict rules to control traffic between the internal network, DMZ, and external network.
Why the Other Options Are Less Suitable:
A. Management VLAN: Refers to a virtual LAN dedicated to managing network devices, not for creating a perimeter network.
B. Bastion Service: Typically a highly secured server that serves as a gateway between internal and external networks but doesn’t involve a three-interface firewall configuration.
C. Honeynet: A network of honeypots designed to attract and analyze cyber-attacks, not for isolating internal networks from the internet.
Think of a screened subnet as the buffer zone between your fortress (internal network) and the wild lands (internet), keeping the baddies at bay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is an open standard that introduces a method to prevent sender address forgery by protecting the envelope sender address, which is used for message delivery?
A. SPF
B. OpenDNS
C. DNSSEC
D. SNMPv3

A

The correct answer is A. SPF (Sender Policy Framework).
Explanation:
SPF (Sender Policy Framework) is an open standard that specifies a method to prevent sender address forgery by protecting the envelope sender address, which is used for message delivery1
. It helps to ensure that the sender’s address is legitimate and not spoofed, reducing the risk of email-based attacks like phishing and spam.

**The answer on my quiz is SNMPv3 why is that
Copilot
I see, thanks for pointing that out! SNMPv3 (Simple Network Management Protocol Version 3) is indeed an advanced version of SNMP that provides enhanced security features, including authentication and encryption1
. However, it’s not typically associated with preventing sender address forgery in email systems.
It seems like there might be a mix-up in the quiz question. SPF (Sender Policy Framework) is the correct answer for preventing sender address forgery in email systems. SNMPv3 is more relevant to network management and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which security service evolved from early HIDS solutions a “lighter” software agent installed on the host systems to detect and investigate suspicious activities on host endpoints?
A. Database activity monitors (DAM)
B. File Integrity monitoring (FIM)
C. Intrusion detection systems (IDS)
D. Endpoint detection response (EDR)

A

D. Endpoint detection and response (EDR)
Explanation:
Endpoint Detection and Response (EDR) evolved from early Host Intrusion Detection Systems (HIDS) and provides a “lighter” software agent installed on host systems to detect and investigate suspicious activities on host endpoints.
Why EDR?:
Advanced Threat Detection: EDR solutions continuously monitor and analyze endpoint activities to detect advanced threats.
Real-Time Response: Provides real-time monitoring, detection, and response capabilities for suspicious activities.
Comprehensive Analysis: Collects and analyzes endpoint data, offering detailed insights and forensics for incident investigations.
Integration: Works seamlessly with other security tools to enhance overall endpoint security.
Why the Other Options Are Less Suitable:
A. Database Activity Monitors (DAM):
Focus on monitoring and protecting database activities rather than general endpoint security.
B. File Integrity Monitoring (FIM):
Monitors changes to specific files and directories but does not provide comprehensive endpoint detection and response capabilities.
C. Intrusion Detection Systems (IDS):
Focus on detecting intrusions but do not provide the extensive analysis and response capabilities of EDR.
EDR is like having a security watchdog on every device, ready to sniff out and respond to anything suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is an application layer gateway server or service (physical or virtual) dedicated to analysis and control of HTTP and HTTPS traffic?
A. Spam filter
B. Web filter
C. Jump server
D. Reputation filter

A

B. Web filter
Explanation:
A web filter is an application layer gateway server or service dedicated to analyzing and controlling HTTP and HTTPS traffic. It inspects web traffic to enforce policies, block access to malicious sites, and prevent harmful content from reaching users.
Why Web Filter?:
HTTP/HTTPS Analysis: Specifically designed to handle web traffic protocols.
Content Control: Filters out unwanted or harmful web content based on predefined policies.
Security: Helps protect against web-based threats such as malware and phishing.
Why the Other Options Are Less Suitable:
A. Spam Filter: Focuses on filtering out unwanted email messages, not web traffic.
C. Jump Server: Provides secure access to and management of network devices, not dedicated to web traffic analysis.
D. Reputation Filter: Blocks or allows traffic based on reputation scores but is not specifically dedicated to HTTP/HTTPS traffic analysis.
Web filters are your gatekeepers for internet safety, keeping the web experience clean and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is a Microsoft Windows service that enables IT administrators to centrally manage and configure the operating system settings, applications, browsers, and user settings?
A. Kerberos
B. Group Policy
C. SELinux
D. Active Directory

A

B. Group Policy
Explanation:
Group Policy is a feature of Microsoft Windows that allows IT administrators to centrally manage and configure operating system settings, applications, browsers, and user settings. It is a powerful tool used in Windows environments to enforce security settings, install software, and control what users can and cannot do on their computers.
Why Group Policy?:
Centralized Management: Provides a way to manage multiple users and computers from a single point.
Policy Enforcement: Enforces security policies across the network.
Configuration Control: Allows detailed configuration of operating system features and software applications.
Scalability: Suitable for both small and large organizations.
Why the Other Options Are Less Suitable:
A. Kerberos: A network authentication protocol used to provide secure authentication for users and services in a network, not for managing system settings.
C. SELinux (Security-Enhanced Linux): An access control implementation for Linux, not relevant to Windows environments.
D. Active Directory: A directory service for Windows domain networks that provides authentication and directory services but relies on Group Policy for configuration management.
Group Policy is like the command center for IT admins, making sure every setting is just the way it needs to be across the whole network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which IPS tuning scenario involves an error state occurring when an action is taken by the sensor?
A. True positive
B. True negative
C. False negative
D. False positive

A

D. False positive
Explanation:
A false positive in the context of an Intrusion Prevention System (IPS) tuning scenario occurs when the sensor mistakenly identifies normal, legitimate activity as malicious and takes action based on this incorrect identification.
Scenarios:
True Positive: Correctly identifies malicious activity and takes appropriate action.
True Negative: Correctly identifies legitimate activity and takes no action.
False Negative: Fails to identify malicious activity, resulting in no action when action is needed.
False Positive: Incorrectly identifies legitimate activity as malicious, resulting in unnecessary action.
False positives can disrupt normal network operations and cause unnecessary alerts, making it important to tune the IPS accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which security control enforces inability of a subject to deny that they participated in a digital transaction, agreement, contract, or communication such as an email?
A. Confidentiality
B. Availability
C. Integrity
D. Non-repudiation

A

D. Non-repudiation
Explanation:
Non-repudiation ensures that a subject cannot deny their participation in a digital transaction, agreement, contract, or communication. It combines cryptographic techniques and mechanisms like digital signatures to provide proof of the origin and integrity of data, ensuring accountability.
Why Not the Other Options?:
A. Confidentiality: Ensures that information is only accessible to those authorized to view it, but does not relate to preventing denial of participation.
B. Availability: Ensures that information and resources are available when needed, unrelated to participation verification.
C. Integrity: Ensures that data remains accurate and unaltered, but does not prevent denial of participation.
Non-repudiation is like the digital witness that ensures no one can deny their part in an electronic handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a strict mathematical model where access to resources is determined by the system based on predefined security labels and rules?
A. ABAC
B. DAC
C. MAC
D. RBAC

A

C. MAC (Mandatory Access Control)

Explanation:
Mandatory Access Control (MAC) is a strict access control model where the operating system or security kernel enforces access rights based on predefined security labels and rules. Users and resources are assigned security labels, and access decisions are made by comparing these labels according to specific policies.
Why MAC?:
Predefined Labels: Access rights are determined by security labels (classification levels) and rules set by the system, not by individual users.
Centralized Control: The system enforces access control, providing a high level of security.
Non-Discretionary: Users cannot alter access rights, preventing unauthorized changes and ensuring consistent enforcement of security policies.
Why the Other Options Are Less Suitable:
A. ABAC (Attribute-Based Access Control):
Access decisions are based on attributes (e.g., user role, resource type), but it’s more flexible and less strict than MAC.
B. DAC (Discretionary Access Control):
Access rights are managed by individual users, allowing them to grant or revoke access to their resources.
D. RBAC (Role-Based Access Control):
Access rights are assigned based on roles within an organization, providing a more flexible structure than MAC.
MAC is like a strict guardian that enforces rules without exception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one way enable authentication of non-traditional network endpoints such as smart card readers, HVAC systems, medical equipment, and IP-enabled door locks?
A. Packet mode
B. Endpoint fingerprinting
C. Protected access files
D. Repudiation

A

B. Endpoint fingerprinting.
Explanation:
Endpoint fingerprinting involves identifying and authenticating non-traditional network endpoints, such as smart card readers, HVAC systems, medical equipment, and IP-enabled door locks, by analyzing their unique characteristics and behaviors. This method ensures that only authorized devices can connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of security control is made up of mandatory policies and regulations that are in place to maintain consistency and compliance?
A. Directive
B. Corrective
C. Deterrent
D. Preventative

A

A. Directive
Explanation:
Directive controls are security measures that consist of mandatory policies, regulations, and procedures designed to ensure consistency and compliance within an organization. These controls guide user behavior and establish clear guidelines for expected actions.
Why Directive?:
Mandatory Policies: Establish required actions and rules that must be followed.
Consistency: Ensure uniform application of security measures across the organization.
Compliance: Help meet regulatory requirements and internal standards.
Why the Other Options Are Less Suitable:
B. Corrective: These controls aim to correct issues after they have occurred (e.g., patch management).
C. Deterrent: Intended to discourage malicious actions (e.g., warning signs).
D. Preventative: Designed to prevent security incidents (e.g., firewalls).
Directive controls are like the rulebook everyone has to follow to keep things safe and sound.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security control enforces the inability of a subject to deny that they participated in a digital transaction, agreement, contract, or communication such as an email?
A. Confidentiality
B. Non-repudiation
C. Availability
D. Integrity

A

B. Non-repudiation
Explanation:
Non-repudiation is a security control that ensures a subject cannot deny their participation in a digital transaction, agreement, contract, or communication, such as an email. It combines cryptographic techniques like digital signatures to provide proof of the origin and integrity of data, ensuring accountability and preventing the subject from denying their involvement.
Why Not the Other Options?:
A. Confidentiality: Ensures that information is only accessible to those authorized to view it but does not address denial of participation.
C. Availability: Ensures that information and resources are available when needed but is unrelated to participation verification.
D. Integrity: Ensures that data remains accurate and unaltered but does not prevent denial of participation.
Non-repudiation is like the ultimate proof that you were there and involved, making sure no one can deny it later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which category of controls supports ongoing maintenance, due care, and continual improvement such as conducting tested patch management?
A. Technical
B. Physical
C. Managerial
D. Operational

A

D. Operational
Explanation:
Operational controls are designed to support the day-to-day maintenance, due care, and continual improvement of an organization’s security posture. This includes activities such as tested patch management, user training, incident response, and system monitoring.
Why Operational?:
Day-to-Day Activities: Encompasses ongoing activities that ensure systems are functioning securely and efficiently.
Maintenance and Improvement: Focuses on continuous improvement and adaptation to new security threats.
Examples: Includes patch management, regular audits, monitoring, and security training.
Why Not the Other Options?:
A. Technical: These controls involve technology-based solutions like firewalls, intrusion detection systems, and encryption but do not encompass maintenance and ongoing improvement.
B. Physical: These controls are concerned with the physical security of facilities, such as locks, badges, and guards.
C. Managerial: These controls involve planning, policy, and management activities like risk assessments and security planning, rather than day-to-day operational tasks.
Operational controls keep the security engine running smoothly and adaptively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which security goal controls an attacker’s ability to get unauthorized access to data or information from an application or system?
A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation

A

B. Confidentiality
Explanation:
Confidentiality is the security goal that controls an attacker’s ability to get unauthorized access to data or information. It ensures that sensitive information is only accessible to those who are authorized and prevents unauthorized individuals from viewing or using the data.
Why Not the Other Options?:
A. Integrity: Ensures that data remains accurate and unaltered, but does not specifically prevent unauthorized access.
C. Availability: Ensures that information and resources are accessible when needed, focusing on uptime and reliability rather than access control.
D. Non-repudiation: Ensures that parties cannot deny their actions or involvement in a transaction, rather than controlling access.
Confidentiality is all about keeping secrets safe from prying eyes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the process of granting an authenticated entity permission to access a resource or perform a specific function?
A. Authentication
B. Authorization
C. Accounting
D. Availability

A

B. Authorization
Explanation:
Authorization is the process of granting an authenticated entity permission to access a resource or perform a specific function. After a user’s identity is verified through authentication, authorization determines what resources or operations the user is permitted to access.
Why Not the Other Options?:
A. Authentication: Confirms the identity of an entity but does not involve granting permissions.
C. Accounting: Involves tracking user actions and resource usage, focusing on audit and monitoring.
D. Availability: Ensures that resources are accessible when needed, not related to granting access permissions.
Authorization is all about who gets to do what once they’re through the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of these are common ways to authenticate people? Choose all that apply.
A. A QR or other code they present on a device
B. An X.509 device certificate
C. A smart card token or fob that they possess
D. A password, PIN, or passphrase they know
E. A biometric attribute
F. A network interface MAC address

A

A. A QR or other code they present on a device C. A smart card token or fob that they possess D. A password, PIN, or passphrase they know E. A biometric attribute
Explanation:
A. QR or Other Code: Often used for multi-factor authentication (MFA) where users present a QR code for verification.
C. Smart Card/Token/Fob: These physical items are used for accessing secure systems and networks.
D. Password/PIN/Passphrase: Common method of verifying identity through something the user knows.
E. Biometric Attribute: Includes fingerprints, facial recognition, and other biometric data unique to the individual.
The other options are less common for authenticating people:
B. X.509 Device Certificate: Typically used for device authentication, not personal authentication.
F. Network Interface MAC Address: Used to identify devices on a network, not for personal authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

With traditional NetFlow services, a flow is technically defined by its 5-tuple, a collection of five data points. Which are valid points in a NetFlow record? Choose all that apply.
A. Source IP addresses
B. Source and destination ports
C. MAC address
D. Protocol
E. 802.1Q VLAN ID
F. Destination IP addresses

A

NetFlow records use the 5-tuple to define a flow. Here’s the right breakdown:
A. Source IP addresses: Yes
B. Source and destination ports: Yes
D. Protocol: Yes
F. Destination IP addresses: Yes
MAC address and VLAN ID aren’t part of the classic 5-tuple definition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which authentication model is used in SNMPv3?
A. User and group based
B. Community based
C. Anomaly based
D. Passphrase based

A

A. User and group based authentication. This model enhances security by implementing user-based access control, ensuring that only authorized users can access specific SNMP data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which form of monitoring leverages lightweight software on the devices or virtual machine to track the uptime and performance?
A. API-based monitoring
B. Clientless monitoring
C. Agentless monitoring
D. Agent-based monitoring

A

D. Agent-based monitoring. This approach uses lightweight software agents installed on devices or virtual machines to monitor uptime and performance metrics. These agents gather data and send it back to a central monitoring system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a solution that helps enterprises detect, analyze, and respond to security threats before they affect business operations by gathering even log data from a range of sources and recognizes activity that diverges from the norm in real-time?
A. SNMP
B. SCAP
C. SIEM
D. SOAR

A

C. SIEM (Security Information and Event Management). SIEM systems gather log data from various sources, correlate and analyze the data to detect threats, and allow for real-time monitoring and alerting. It helps enterprises respond to security threats before they can disrupt business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the process of accumulating, categorizing, standardizing, and consolidating log data from across an IT infrastructure to enable and enhance streamlined log analysis?
A. Aggregation
B. Collaboration
C. Deduplication
D. Obfuscation

A

A. Aggregation. This process gathers, categorizes, standardizes, and consolidates log data from various sources across an IT infrastructure to streamline and enhance log analysis. Essential for keeping things in order, really.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which feature of an anti-virus software uses human-defined rules to dynamically find suspicious architecture and behavior in code?
A. Cloud analysis
B. Sandbox analysis
C. Heuristic detection
D. User behavioral analytics

A

C. Heuristic detection. This feature uses predefined rules to identify suspicious behavior and anomalies in code, helping to catch new or unknown threats dynamically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which is an assortment of software services and tools that allow organizations to simplify and aggregate security operations in areas of threat and vulnerability management, incident response, and security operations automation?
A. SIEM
B. SNMP
C. SOAR
D. SCAP

A

C. SOAR (Security Orchestration, Automation, and Response). SOAR platforms help organizations streamline security operations by integrating various tools and automating responses to incidents and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which SCAP specification is a standardized method of describing and identifying classes of applications, operating systems, and hardware devices present among an enterprise’s computing assets?
A. Trust model for security automation data (TMSAD)
B. Software identification (SWID) tagging
C. Open checklist interactive language (OCIL)
D. Common platform enumeration (CPE)

A

D. Common Platform Enumeration (CPE). CPE is a standardized method used to describe and identify classes of applications, operating systems, and hardware devices. It’s all about keeping your IT assets in check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which service involves managing serval or many automated tasks or processes?
A. Automation
B. Scripting
C. Batching
D. Orchestration

A

D. Orchestration. This service involves coordinating multiple automated tasks or processes to work together efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which type of incident response test typically involves diagrams, floor plans, logical and virtual graphical visualizations to further eliminate gaps/errors?
A. Tabletop
B. Read-through
C. Walkthrough
D. Parallel

A

A. Tabletop
Tabletop exercises are definitely another solid way to test incident response plans—participants verbally walk through the steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of these is a benefit of automation? Select all that apply.
A. Enforcing baselines
B. Faster reaction time
C. Standardizing infrastructure configuration
D. Enhanced customization
E. Efficiency and productivity
F. Greater user intervention

A

Automation brings quite a few benefits. Here’s a rundown of what fits:
A. Enforcing baselines: Yes
B. Faster reaction time: Yes
C. Standardizing infrastructure configuration: Yes
E. Efficiency and productivity: Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which statements is TRUE when considering automation?
A. Automation systems can also be a technical debt if implemented in a rush or untested
B. Automation and scripting will often increase costs for provisioning/onboarding users and devices
C. Automation is useless without orchestration
D. Automation is the best solution in every case

A

A. Automation systems can also be a technical debt if implemented in a rush or untested. True to a point—quick fixes or poorly implemented automation can create issues down the line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In the forensic order of volatility, what would be considered the MOST volatile?
A. Kernel statistics, tables, and caches
B. CPU registers and its cache
C. Temporary file systems and swap/slack space
D. Memory (RAM)

A

B. CPU registers and its cache. This is the most volatile because it can be lost almost immediately when the system is powered down. The faster it needs to be collected, the higher its volatility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is defined as a factor that introduced a nonconformance in an application, service, or system; the core causative issue that sets in motion the entire cause-and-effect reaction that ultimately leads to the problem?
A. Root cause
B. Threat agent
C. Kill chain
D. Threat actor

A

A. Root cause. It’s the underlying factor that starts the chain reaction leading to a problem in an application, service, or system. Getting to the root cause is essential for effective troubleshooting and long-term fixes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is another term used for the incident response “Detection” phase?
A. Investigation
B. Intelligence
C. Initiation
D. Identification

A

D. Identification. This phase is all about detecting and identifying potential security incidents so they can be addressed promptly.

35
Q

Which is commonly used to centralize the storage and analysis of logs and other security-related documentation to perform near real-time analysis?
A. NetFlow
B. SOAR
C. SIEM
D. SYSLOG

A

C. SIEM (Security Information and Event Management). SIEM systems are great for centralizing log storage and analysis, performing near real-time monitoring to detect threats and issues.

36
Q

Which popular form of malware encrypts key files and captures them until the victim pays the attackers Bitcoin?
A. Ransomware
B. Firmware
C. Bloatware
D. Spyware

A

A. Ransomware. This type of malware encrypts key files and demands a ransom, often in Bitcoin, to decrypt them.

37
Q

Which physical attack uses devices that overlay an ATM machine or point-of-sale scanner to steal the information from the victim?
A. Spoofing
B. Skimming
C. Brute force
D. RFID cloning

A

B. Skimming. Skimmers are devices that criminals place over ATM machines or point-of-sale scanners to capture card information from unsuspecting users. It’s a sneaky tactic that’s been around for a while.

38
Q

Which common form of DDoS attack involves a network of zombie systems and a master command and control (C&C) server to remotely control the victims?
A. Extranet attack
B. Cache Poisoning attack
C. Botnet attack
D. Amplification attack

A

C. Botnet attack. Botnets leverage a network of compromised systems, often referred to as “zombies,” which are remotely controlled by a master C&C server to carry out attacks, like DDoS.

39
Q

Which is a type of brute force attack where the attacker slowly performs brute force logins based on a list of usernames with default passwords on the application?
A. Brute force
B. Spraying
C. Downgrade
D. Spoofing

A

B. Spraying. In this type of attack, the attacker attempts to gain access by trying a few common passwords across many accounts, rather than focusing on a single account. Slow and sneaky.

40
Q

Which form of application attack changes a program’s execution path and overwrites elements of its memory, which amends the program’s execution path to damage existing files or expose data?
A. Credential replay
B. Replay attacks
C. Directory traversal attacks
D. Buffer overflow

A

D. Buffer overflow. This attack overwrites parts of a program’s memory, leading to a change in the program’s execution path, potentially causing file damage or exposing data.

41
Q

Which of these would be considered an indicator of compromise? Choose all that apply.
A. Logging to a SIEM system
B. High resource consumption
C. Blocked content
D. Impossible travel
E. Successful logins
F. Concurrent session usage

A

Indicators of compromise (IOCs) are signs that a security breach or incident has occurred. Here are the ones that fit:
B. High resource consumption
C. Blocked content
D. Impossible travel
F. Concurrent session usage
Logging to a SIEM system and successful logins are more about normal operations rather than anomalies.

42
Q

Which type of attack leverages a scenario when two different inputs can produce the same fingerprint or digest?
A. Collision
B. Downgrade
C. Brute force
D. Side channel

A

A. Collision. This attack takes advantage of the fact that two different inputs can produce the same hash value, undermining the integrity of the data.

43
Q

Which disaster recovery testing solution involves completely shutting down operations at the primary site to completely emulate the disaster and use the recovery site solution?
A. Parallel test
B. Simulation test
C. Full interruption test
D. Walkthrough test

A

C. Full interruption test. This test involves completely shutting down operations at the primary site to fully simulate a disaster, making sure the recovery site solution can handle it.

44
Q

Which technology, widely used in data center, manufacturing and cloud services industries, is a technique for analyzing how much production capacity organizations need to meet consumer demand?
A. Capacity Planning
B. Deployment planning
C. Tabletop Planning
D. Availability management

A

A. Capacity Planning. It’s essential for ensuring that organizations have enough production capacity to meet consumer demand, often crucial in data centers and cloud services.

45
Q

What are planned power outages, usually implemented in areas with unstable grids or with infrastructure that cannot handle the population it serves?
A. Permanent faults
B. Interruptible power
C. Brownouts
D. Rolling blackouts

A

D. Rolling blackouts. These are planned power outages that help manage the load on an unstable grid or infrastructure that can’t handle the population it serves.

46
Q

Which of these disaster recovery site solutions is the cheapest and slowest option?
A. Mobile site
B. Cloud site
C. Reciprocal cold site
D. Warm site

A

C. Reciprocal cold site. It’s typically the least expensive option, but also the slowest to get up and running in case of a disaster. It relies on agreements with other organizations to share unused infrastructure.

47
Q

Which type of backup is an immediate point-in-time virtual copy of the source data where the time to backup does not increase with amount of data?
A. Incremental
B. Differential
C. Full
D. Snapshot

A

D. Snapshot. Snapshots create immediate point-in-time virtual copies of the source data, and the time to backup doesn’t increase with the amount of data.

48
Q

Which business impact metric measures the average time needed to repair or replace a failed system or module?
A. MTBF
B. MTTR
C. MAC
D. MTD

A

B. MTTR (Mean Time to Repair). This metric measures the average time required to repair or replace a failed system or module, reflecting how quickly a system can return to normal operations.

49
Q

Which technology solution is designed to be a redundant set of service functionalities based on active-standby or active-active deployments of two or more components or systems?
A. Target grouping
B. Clustering
C. Segmenting
D. Load Balancing

A

B. Clustering. This involves creating a redundant set of service functionalities through active-standby or active-active deployments of two or more components or systems.

50
Q

What is broadly defined as the rules that protect the assets and continuity of an organization including mission statements, charters, policies, standards, and procedures?
A. Compliance
B. Security governance
C. Steering committee
D. Board of directors

A

B. Security governance. It encompasses the rules, policies, standards, and procedures that protect an organization’s assets and ensure continuity.

51
Q

What allows an information technology staff to be consistent and systematic by specifying the use of certain technologies in a uniform way, because no one individual practitioner can know everything?
A. Standards
B. Policies
C. Procedures
D. Guidance

A

A. Standards. These define consistent and systematic use of technologies, ensuring that no single practitioner needs to know everything.

52
Q

Which term refers to advice or information provided by a person or group with the expertise to address a problem or make improvements?
A. Policies
B. Consulting
C. Operating Procedures
D. Guidance

A

D. Guidance
Guidance fits as a term because it refers to advice or information provided by experts to address problems or make improvements. It’s broad and encompasses various forms of expert advice, policies included.

53
Q

What describes the actions an organization takes to comply with those rules and policies as part of its operations?
A. External regulatory compliance
B. External board of directors
C. External steering committee
D. External chief officers

A

A. External regulatory compliance. These actions ensure the organization follows applicable rules, policies, and regulations as part of its operations.

54
Q

What are the step-by-step instructions that define how workers carry out routine tasks to greatly improve efficiency, quality, and performance?
A. Standards
B. Best practices
C. Standard operating procedures
D. Policies

A

C. Standard Operating Procedures. These are detailed, written instructions that outline exactly how workers should perform routine tasks, ensuring consistency and efficiency.

55
Q

Which stakeholders, also referred to as controllers, maintain the assets from a technical and operational perspective?
A. Owners
B. Stewards
C. Processors
D. Custodians

A

D. Custodians. They are the stakeholders responsible for maintaining and managing assets from a technical and operational perspective.

56
Q

What is a group of key organizational stakeholders that makes determinations regarding an organization’s priorities or order of business, and manages its operations general counsel?
A. Board of Directors
B. Centralized governance
C. C-suite
D. Steering committee

A

D. Steering committee
A steering committee is made up of key organizational stakeholders who help determine priorities, manage operations, and provide direction. They’re often involved in guiding projects and making strategic decisions, similar to a Board of Directors but typically more focused on specific initiatives or programs.

57
Q

Which is considered the gold standard customer experience metric that measures participant loyalty by looking at their probability of recommending a give security training experience?
A. NPS
B. OWASP
C. PTES
D. SSAF

A

A. NPS (Net Promoter Score). This metric measures customer loyalty by assessing how likely participants are to recommend a given experience, making it a gold standard in customer experience.

58
Q

Which is a critical internal email hoax designed to replicate a real attack employee as part of security awareness training?
A. Advance persistent threat
B. Walkthrough test
C. Phishing campaign
D. Watering hole

A

C. Phishing campaign. This tactic is often used in security awareness training to simulate real attacks and educate employees on how to recognize and respond to phishing attempts.

59
Q

Which are used to certify security professionals at various experience levels to participate in auditing and assessments?
A. Security acknowledgement
B. Security examinations
C. Security assertions
D. Security assessments

A

B. Security examinations. These certify security professionals across various experience levels, enabling them to participate in audits and assessments.

60
Q

Which of these are common topics of user guidance and training? Choose all that apply.
A. VPN policy configuration
B. Datacenter switch hardening
C. Situational awareness
D. Hybrid/remote worker acceptable use
E. Password policies and management
F. Removable media and cables

A

C. Situational awareness
D. Hybrid/remote worker acceptable use
E. Password policies and management
F. Removable media and cables

61
Q

What is a more cost-effective assessment solution that enables an organization’s audit activities to leverage a capable, independent internal validator who is well-versed in security assessment methodology?
A. Self-assessment with Independent Validation (SAIV)
B. Consensus Assessment Initiative Questionnaire (CAIQ)
C. RACI charts
D. Software Assurance Maturity Model (SAMM)

A

A. Self-assessment with Independent Validation (SAIV). This approach allows an organization to use a knowledgeable internal validator to conduct assessments, making it a cost-effective solution for audit activities.

62
Q

What is the first step in the penetration testing lifecycle?
A. Persistence
B. Privilege escalation
C. Reconnaissance
D. Rules of engagement agreement

A

D. Rules of engagement agreement
“Rules of engagement agreement” being the first step makes sense from a procedural standpoint. Before even beginning reconnaissance, defining the scope, methods, and boundaries of the penetration test ensures both parties are on the same page and that the test doesn’t disrupt operations or violate any agreements. Without this, you risk a chaotic start, so it’s a crucial foundational step.

63
Q

What is a scientific/mathematical approach to getting monetary and numeric probabilities based on the percentages, mathematical formulas, and calibrated estimation?
A. Gap analysis
B. Qualitative analysis
C. Risk analysis
D. Quantitative analysis

A

D. Quantitative analysis. This approach uses mathematical formulas, percentages, and calibrated estimation to determine monetary and numeric probabilities, providing a scientific basis for decision-making.

64
Q

Which business impact analysis method represents the absolute maximum amount of time that a resource, service, or function can be unavailable before the entity start to experience a catastrophic loss?
A. RPO
B. MTTR
C. MTBF
D. MTD

A

D. MTD (Maximum Tolerable Downtime). This metric represents the absolute maximum duration a resource, service, or function can be unavailable before causing severe impact or catastrophic loss to the organization.

65
Q

Which of these are common approaches to risk identification and assessment?
A. Centralized
B. Asymmetric
C. Continuous
D. Recurring
E. One-time
D. Ad hoc

A

C. Continuous
D. Recurring
E. One-time
F. Ad hoc

66
Q

Which are common types of security reporting techniques?
A. White papers and special publications
B. Service desk tickets
C. Published to an intranet
D. Written reports and summaries
E. Live presentations (in-person or conferencing sessions)
F. Request for comments

A

A. White papers and special publications
C. Published to an intranet
D. Written reports and summaries
E. Live presentations (in-person or conferencing sessions)

67
Q

Which term describes the vulnerability that remains AFTER the mitigating controls are introduced?
A. Positive risk
B. Residual risk
C. Total risk
D. Inherent risk

A

B. Residual risk. This is the vulnerability that remains even after implementing mitigating controls.

68
Q

Which risk treatment approach involves deciding not to undertake actions or engage in activities that introduce or increase risk?
A. Avoid
B. Accept
C. Mitigate
D. Transfer

A

A. Avoid. This approach involves deciding not to engage in activities that introduce or increase risk.

69
Q

Which is a form of structured data document that represents a compilation of information related to vulnerabilities, risks, and countermeasures and serves as a repository of identified risks, impact, scenarios, and potential responses?
A. CMDB
B. Matrix
C. Register
D. Archive

A

C. Register. A risk register is a structured document that compiles information related to vulnerabilities, risks, and countermeasures, serving as a repository of identified risks, impacts, scenarios, and potential responses.

70
Q

Which practices contribute to system hardening? Choose all that apply.
A. Opening all TCP and UDP ports
B. Disabling all auto-configure features
C. Implementing forced vacations
D. Replacing all default passwords with strong credentials
E. Utilizing password less solutions
F. Removing all unnecessary and unauthorized software

A

B. Disabling all auto-configure features
D. Replacing all default passwords with strong credentials
E. Utilizing password less solutions
F. Removing all unnecessary and unauthorized software
These steps enhance security and help prevent unauthorized access or vulnerabilities.

71
Q

Which Linux command would one use to modify a file and directory permission?
A. touch
B. chmod
C. mkdir
D. sudo

A

B. chmod. This is used to change file and directory permissions in Linux. chmod stands for “change mode” and is essential for adjusting who can read, write, or execute a file.

72
Q

Which are terms that can be considered synonymous with segmentation? Choose all that apply.
A. Isolation
B. Multicasting
C. Zoning
D. Segregation
E. Security grouping
F. Partitioning

A

A. Isolation
C. Zoning
D. Segregation
F. Partitioning

73
Q

What is the principle that users and programs should only have the necessary privileges to complete their tasks?
A. Separation of duties
B. Dual operator
C. Mediated access
D. Least privilege

A

D. Least privilege. This principle ensures users and programs only have the minimum level of access necessary to perform their tasks, reducing the risk of accidental or malicious misuse.

74
Q

What is a common location to collect and send automated monitoring visibility and sending feeds?
A. Demilitarized zone
B. Security operations center
C. Proxy server
D. Firewall appliance

A

B. Security operations center (SOC). It’s the hub for collecting and sending automated monitoring visibility and feeds, ensuring continuous surveillance and response to security incidents.

75
Q

Which security service helps protect private information, sensitive data, and can enhance the security of communication between client apps and server?
A. Spraying
B. Encrypting
C. Hashing
D. Spoofing

A

B. Encrypting is the security service that protects private information and sensitive data by transforming it into unreadable code. It enhances the security of communication between client apps and servers.

76
Q

What is a set of data, tools, utilities, and processes used to support configuration management?
A. DNS
B. SQL
C. CMS
D. CSV

A

C. CMS (Configuration Management System). It encompasses data, tools, utilities, and processes used to support configuration management in an organization, ensuring that all configuration items are effectively managed and tracked.

77
Q

What is the most stringent privacy and security law in the world drafted and passed by the European Union (EU)?
A. HITECH
B. GLBA
C. GDPR
D. PCI-DSS

A

C. GDPR (General Data Protection Regulation) It’s considered the most stringent privacy and security law in the world, drafted and passed by the European Union.

78
Q

In which data lifecycle phase is data typically placed onto a volume (block), object (blob), file system, or into one of several types of databases?
A. Store
B. Create
C. Share
D. Use

A

A. Store. In this phase, data is typically placed onto a volume, object, file system, or into databases for safekeeping and later use.

79
Q

What is any representation of data that allows the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means?
A. Personal health information
B. Regulated data
C. Personally identifiable information
D. Intellectual property

A

C. Personally Identifiable Information (PII). This encompasses any data that can be used to identify an individual, either directly or indirectly.

80
Q

What is a process of dividing and organizing data and information into defined groups to enable handling, labeling, sorting, viewing, and securing?
A. Compartmentalization
B. Encryption
C. Tokenization
D. Segmentation

A

D. Segmentation. It involves organizing data into distinct groups for better handling, labeling, sorting, viewing, and securing.

81
Q

Which data obfuscation technique involves sending sensitive data through an API call (or batch file) to a system that replaces the data with non-sensitive data, pseudorandom placeholders?
A. Obscuring
B. Encryption
C. Tokenization
D. Data Mapping

A

C. Tokenization. This technique replaces sensitive data with non-sensitive placeholders, often through an API call, making it invaluable for securing information without compromising its usability.

82
Q

Which type of data is temporarily in computer memory Redis cache waiting to be read or updated?
A. Data at rest
B. Data in storage
C. Data in transit
D. Data in use

A

D. Data in use. This data is actively being accessed, processed, or updated in computer memory, like Redis cache.

83
Q

Which algorithm is most commonly used to protect data at rest?
A. 3DES
B. AES
C. TLS
D. DHKE

A

B. AES (Advanced Encryption Standard). It’s the most commonly used algorithm for protecting data at rest due to its strong security features and efficiency.

84
Q

Which type of corporate data classification applies to information limited to employees only and often has different security requirements that affect who can access it and how it can be used?
A. Top secret
B. Confidential
C. Internal
D. Public

A

C. Internal. This classification applies to information accessible only to employees and often comes with specific security measures to control who can access it and how it can be used.

85
Q
A