Security+ Warm Up Flashcards
A company would like to prevent the transfer of non-encrypted credit card numbers over the network. Which of the following would be the BEST choice for this requirement?
A) Data loss prevention
B) Digital Signatures
C) SSL inspection
D) Certificate authority
E) Self-encrypting drives
A) Data loss prevention
DLP: Data Loss Prevention. Looks for and stops running data you don’t want running on your network. If someone sends their social security number over the network, DLP stops it. Also prohibits USB access and blocks sensitive information in inbound and outbound emails, if you set it up that way. (4.4 & 4.5)
A known vulnerability that passes through an IPS without an alert is an example of what?
A) False negative
B) Obfuscation
C) Blockchain
D) Federation
A) False negative
False Negative: A vulnerability that exists, but your software didn’t find it. (4.3)
A client using an API to access an application function is an example of what?
A) Hashing
B) Secure enclave
C) Microservices
D) False negative
C) Microservices
Microservices: Instead of having one big application running all of the functions of the application simultaneously, you can have different aspects of the application run on and be supplied by different services still accessible from one client through an API gateway. The API gateway is the glue that makes all the services run when they’re needed. Security for each microservice can be provided individually, instead of security for one big application. (3.1)
All data on a mobile device being encrypted is an example of what?
A) Obfuscation
B) Federation
C) Blockchain
D) Secure enclave
D) Secure enclave
Secure Enclave: A security processor built into the systems we use. (1.4)
Application transactions that are logged in a public ledger is an example of what?
A) Federation
B) Blockchain
C) False negative
D) Hashing
B) Blockchain
Blockchain: A distributed ledger for anyone to be able to see that keeps track of transactions. If you are involved in a blockchain, you are notified of any and all changes. The transaction is then added to a new block of data containing other recently verified transactions. A hash is added to the block of data and the block is completed so that if data is changed, everyone looking at it will know. (1.4)
An MSP needs a secure method of connecting to the web servers of a remote client. Which of the following would be the BEST choice for this task?
A) Proxy server
B) SIEM
C) Jump server
D) IPS
E) HSM
C) Jump server
Jump Server: A server that’s on the inside of a private protected network that provides access to allowed clients on the outside trying to access that network. (3.2)
A DDoS has caused a critical service to be unavailable for 90% of the business day. Which of the following would describe this loss of value?
A) Asset value
B) Single loss expectancy
C) Risk appetite
D) Exposure factor
E) Key risk indicator
D) Exposure factor
Exposure Factor: Usually represented as a percentage, it tells users how risky it is to have that vulnerability remain on your system. If it’s minor, the percentage will be small. If it’s major, the percentage will be high. (4.3)
A company is protecting user passwords by hashing the password values multiple times. Which of the following would describe this process?
A) Salting
B) Steganography
C) Symmetric encryption
D) Digital signature
E) Key stretching
E) Key stretching
Key strengthening: Also known as key hashing or key stretching. The process of making your key stronger by hashing the hashes of your password multiple times. The hash of a hash of a hash of a password is difficult to brute-force. (1.4)
An organization has discovered an attacker entering the building using an employee access card, but the employee still has their original card. Which of the following is the most likely explanation?
A) Privilege escalation
B) RFID cloning
C) Brute force
D) Spraying
E) Injection
B) RFID cloning
RFID Cloning: Duplicating an access badge to impersonate a legitimate employee and gain access to where they go. (2.4)
A security administrator has identified all possible points of unauthorized entry on a newly built web server. Which of the following would describe this list?
A) Responsibility matrix
B) Platform diversity
C) Journaling
D) Input validation
E) Attack surface
E) Attack surface
Attack Surface: The combination of potential openings into your network. How does your network look? Are you aware of all of the ways into your network? (3.2)
A login process requires an app with a pseudo-random number. What is the appropriate authentication factor for this?
A) Something you have
B) Somewhere you are
C) Something you know
D) Something you are
A) Something you have
Something you have: Like a smart card, phone, USB security key, or hardware/software token. (4.6)
A user in another country is not able to login to the VPN portal. What is the appropriate authentication factor for this?
A) Something you have
B) Somewhere you are
C) Something you know
D) Something you are
B) Somewhere you are
Somewhere you are: A login allowed or denied based upon where the login took place. Could be based on IP address or GPS location services. (4.6)
An ATM requires a PIN for authentication. What is the appropriate authentication factor for this?
A) Something you have
B) Somewhere you are
C) Something you know
D) Something you are
C) Something you know
Something you know: Like a password or a secret phrase, PIN number or pattern. Very common. (4.6)
A text message with a code is sent during a login process. What is the appropriate authentication factor for this?
A) Something you have
B) Somewhere you are
C) Something you know
D) Something you are
A) Something you have
Something you have: Like a smart card, phone, USB security key, or hardware/software token. (4.6)
A system administrator uses a fingerprint to unlock their laptop. What is the appropriate authentication factor for this?
A) Something you have
B) Somewhere you are
C) Something you know
D) Something you are
D) Something you are
Something you are: Biometrics. (4.6)
A company is assigning administrator rights to IT technicians on a temporary basis. Which of the following would describe this system?
A) Just-in-time permissions
B) Password vaulting
C) Salting
D) Hashing
E) Passwordless access
A) Just-in-time permissions
Just-In-Time Permissions: Granting admin access for a limited time on a specific set of time sensitive credentials. (4.6)
A company performs a risk assessment each time the hardware or software is updated for an application instance. Which of the following would describe this assessment process?
A) One-time
B) Ad hoc
C) Recurring
D) Mandated
E) Third-party
B) Ad hoc
Ad Hoc: A risk assessment designed to look at only one specific threat. (5.2)
Which of the following would BEST describe a honeytoken?
A) A publicly accessible password.txt file
B) Intentionally incorrect API credentials
C) A virtual machine with a known vulnerability
D) A workstation without a locking screen saver
E) A random access code used during login
B) Intentionally incorrect API credentials
Honeytokens: A bit of traceable data added to your honeynet. If data is stolen and shared, you will be notified and can trace it to who stole it. (1.2)
When power is removed from an inline IPS, all network traffic stops. Which of the following would describe this functionality?
A) High availability
B) Parallel processing
C) Load balancing
D) Cold site
E) Failed closed
E) Failed closed
Fail-Close: When a system fails, data stops flowing. (3.2)
A server was previously infected with malware, and a technician is reimaging the system and updating the application software. Which of the following best describes this incident response step?
A) Preparation
B) Analysis
C) Recovery
D) Lessons learned
E) Detection
C) Recovery
Recovery: Getting things back to normal. Replacing software, re-imaging, disabling compromised accounts, fixing vulnerabilities, recovering the OS, etc. (4.8)
A security engineer is following a checklist to recover a system containing a malware infection. Which of the following would describe this process list?
A) Change management
B) Playbook
C) Disaster recovery
D) Business continuity
E) Centralized governance
B) Playbook
Playbooks: Conditional steps to follow in the case of a particular event. For example, a checklist of what happens if, say, there’s a data breach, or you need to recover a device from ransomware. Can sometimes be implemented into a SOAR platform (Security Orchestration, Automation, and Response), and automated. (5.1)
Which technology would be utilized in this scenario?
Verifying the status of a web server certificate.
A) Tokenization
B) Federation
C) Blockchain
D) OCSP
D) OCSP
OCSP: Online Certificate Status Protocol. A protocol that lists the status of its certificate onto the web server itself. (1.4)
Which technology would be utilized in this scenario?
Credit card numbers are being replaced with temporary values.
A) Salting
B) Tokenization
C) OCSP
D) False negative
B) Tokenization
Tokenization: Takes sensitive information such as a credit card number used in a purchase, and replaces it with a token number that is completely different when crossing the network. Only a one time use. Nothing is encrypted, but all the numbers are changed on the token. (3.3)
Which technology would be utilized in this scenario?
Randomization has been added to a hash.
A) Honeyfile
B) Tokenization
C) Salting
D) Blockchain
C) Salting
Salting: Random data added to a password when hashing that password, making a different hash for the password when stored. For example, the password ‘dragon’ has its own unique hash, but the password ‘dragon +r4$x’ has a different hash, but is still able to be deciphered when the password is looked at in plain text. The +r4$x is known to the user to be the salt. (1.4)