SecurityPlus Flashcards

1
Q

In a high-security facility, guards are stationed at every entrance, and all visitors are logged and surveilled. Which type of control is primarily being utilized here?

A

Physical control

Physical control involves securing physical access to facilities, like guard stations and visitor logs, and is the primary control being utilized here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security manager at a software company is revising the SDLC process to include risk management strategies and compliance with legal requirements. Which category of controls is the manager focusing on?

A

Managerial controls

Managerial controls is the correct category because it encompasses decisions and management of risk, focusing on procedures, legal policies, and regulatory policies relevant to the software development lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Following a data breach, your company revises its network security protocols and enhances its incident response procedures. Which type of control does this revision represent?

A

Corrective control

Corrective controls include actions taken to repair damage and enhance procedures post-incident, like the network security protocol revision and incident response enhancements in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A retail company implements a new policy requiring all employees to undergo security awareness training annually. What type of control does this new policy exemplify?

A

Directive control

Directive controls involve guiding the operation and use of systems, like the mandatory security training policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your company sets up a network of simulated vulnerable systems in an effort to trap and study potential attackers. What type of setup does this best describe?

A

Honeynet

A honeynet is a network or system with intentional vulnerabilities to divert attackers from real systems and analyze their behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A global corporation with employees working remotely across different time zones decides to implement a policy where access to sensitive systems is granted based on the user’s role, time of access, and location. Which aspect of security does this approach primarily enhance?

A

Policy-driven access control

Policy-driven access control involves granting access based on predefined policies and information such as the user’s role, time, and location, which aligns with the corporation’s new policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work in the IT department of a large international organization and are tasked with upgrading the authentication system to secure employee access to the company’s internal network better. Considering the increasing number of remote workers using various devices, which authentication model should you prioritize to enhance security without significantly impacting user convenience?

A

Utilizing multifactor authentication (MFA) for all employee access

Multifactor authentication (MFA) is the most suitable choice in this scenario, primarily because it significantly increases security by requiring users to provide two or more verification factors to gain access. This is particularly important given the diversity of devices and locations from which remote workers are accessing the internal network. MFA mitigates risks associated with compromised credentials, a common threat in remote work scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You were at a small regional bank that recently began receiving fraudulent claims that money was not correctly transferred to a designated bank account. Your institution implements a system ensuring that the authorship of a transaction cannot be denied or disputed once made. This measure primarily addresses which fundamental security concept?

A

Non-repudiation

Non-repudiation ensures that the authorship of a transaction cannot be denied, providing assurance of the origin and integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A tech company regularly updates just its network diagrams to reflect recent changes in its IT infrastructure, which is crucial for maintaining an accurate understanding of the network’s current state. What is this practice known as?

A

Updating diagrams

Updating diagrams specifically refers to revising network diagrams to include recent changes in IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a financial organization, the IT team is assigned specific computers, servers, and network equipment to manage. They are responsible for defining the security requirements and managing the risk profile of this equipment. Which of the following best describes this scenario?

A

Ownership

Ownership involves responsibility for specific assets, ensuring security, and managing risk profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is creating a security policy for corporate mobile devices:
* All mobile devices must be automatically locked after a predefined time period.
* The location of each device needs to be traceable.
* All of the user’s information should be completely separate from company data.
Which of the following would be the BEST way to establish these security policy rules?

A

MDM
An MDM (Mobile Device Manager) provides a centralized management system for all mobile devices. From this central console, security administrators can set policies for many different types of mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has placed a SCADA system on a segmented network with limited access from the rest of the corporate network. Which of the following would describe this process?

A

Hardening
The hardening process for an industrial SCADA (Supervisory Control and Data Acquisition) system might include network segmentation, additional firewall controls, and the implementation of access control lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A receptionist at a manufacturing company recently received an email from the CEO asking for a copy of the internal corporate employee directory. It was later determined that the email address was not sent from the CEO and the domain associated with the email address was not a corporate domain name. What type of training could help identify this type of attack in the future?

A

Recognizing social engineering
Impersonating the CEO is a common social engineering technique. There are many ways to recognize a social engineering attack, and it’s important to train everyone to spot these situations when they are occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company has hired a third-party to gather information about the company’s servers and data. This third-party will not have direct access to the company’s internal network, but they can gather information from any other source.
Which of the following would BEST describe this approach?

A

Passive reconnaissance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company’s email server has received an email from a third-party, but the origination server does not match the list of authorized devices. Which of the following would determine the disposition of this message?

A

DMARC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these threat actors would be MOST likely to attack systems for direct financial gain?

A

Organized crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A security administrator has examined a server recently compromised by an attacker, and has determined the system was exploited due to a known operating system vulnerability. Which of the following would BEST describe this finding?

A

Root cause analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A city is building an ambulance service network for emergency medical dispatching. Which of the following should have the highest priority?

A

System availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A system administrator receives a text alert when access rights are changed on a database containing private customer information. Which of the following would describe this alert?

A

Automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A security administrator is concerned about the potential for data exfiltration using external storage drives. Which of the following would be the BEST way to prevent this method of data exfiltration?

A

Create an operating system security policy Quick to block the use of removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A company creates a standard set of government reports each calendar quarter. Which of the following would describe this type of data?

A

Regulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An insurance company has created a set of policies to handle data breaches. The security team has been given this set of requirements based on these policies: Access records from all devices must be saved and archived Any data access outside of normal working hours must be immediately reported Data access must only occur inside of the country Access logs and audit reports must be created from a single database Which of the following should be implemented by the security team to meet these requirements? (Select THREE)

A

Restrict login access by IP address and Quick GPS location
Consolidate all logs on a SIEM
Enable time-of-day restrictions on the authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Rodney, a security engineer, is viewing this record from the firewall logs: UTC 04/05/2023 03:09:15809 AV Gateway Alert 136.127.92.171 80 -> 10.16.10.14 60818 Gateway Anti-Virus Alert: XPACK.A_7854 (Trojan) blocked. Which of the following can be observed from this log information?

A

A download was blocked from a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A user connects to a third-party website and receives this message: Your connection is not private. NET::ERR_CERT_INVALID Which of the following attacks would be the MOST likely reason for this message?

A

On-path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following would be the BEST way to provide a website login using existing credentials from a third-party site?
Federation.
26
A system administrator is working on a contract that will specify a minimum required uptime for a set of Internet- facing firewalls. The administrator needs to know how often the firewall hardware is expected to fail between repairs. Which of the following would BEST describe this information?
MTBF
27
An attacker calls into a company’s help desk and pretends to be the director of the company’s manufacturing department. The attacker states that they have forgotten their password and they need to have the password reset quickly for an important meeting. What kind of attack would BEST describe this phone call?
Social engineering
28
Two companies have been working together for a number of months, and they would now like to qualify their partnership with a broad formal agreement between both organizations. Which of the following would describe this agreement?
MOA
29
Which of the following would explain why a company would automatically add a digital signature to each outgoing email message?
Integrity
30
The embedded OS in a company’s time clock appliance is configured to reset the file system and reboot when a file system error occurs. On one of the time clocks, this file system error occurs during the startup process and causes the system to constantly reboot. Which of the following BEST describes this issue?
Race condition
31
A recent audit has found that existing password policies do not include any restrictions on password attempts, and users are not required to periodically change their passwords. Which of the following would correct these policy issues? (Select TWO)
Password expiration, Account lockout
32
What kind of security control is associated with a login banner?
Deterrent
33
An internal audit has discovered four servers that have not been updated in over a year, and it will take two weeks to test and deploy the latest patches. Which of the following would be the best way to quickly respond to this situation in the meantime?
Move the servers to a protected segment
34
A business manager is documenting a set of steps for processing orders if the primary Internet connection fails. Which of these would BEST describe these steps?
Continuity of operations
35
A company would like to examine the credentials of each individual entering the data center building. Which of the following would BEST facilitate this requirement?
Access control vestibule
36
A company stores some employee information in encrypted form, but other public details are stored as plaintext. Which of the following would BEST describe this encryption strategy?
Record
37
A company would like to minimize database corruption if power is lost to a server. Which of the following would be the BEST strategy to follow?
Journaling
38
A company is creating a security policy for corporate mobile devices: All mobile devices must be automatically locked after a predefined time period. The location of each device needs to be traceable. All of the user’s information should be completely separate from company data. Which of the following would be the BEST way to establish these security policy rules?
MDM
39
A security engineer runs a monthly vulnerability scan. The scan doesn’t list any vulnerabilities for Windows servers, but a significant vulnerability was announced last week and none of the servers are patched yet. Which of the following best describes this result?
False negative
40
An IT help desk is using automation to improve the response time for security events. Which of the following use cases would apply to this process?
Escalation
41
A network administrator would like each user to authenticate with their corporate username and password when connecting to the company's wireless network. Which of the following should the network administrator configure on the wireless access points?
802.1X
42
A company's VPN service performs a posture assessment during the login process. Which of the following mitigation techniques would this describe?
Configuration enforcement
43
A user has assigned individual rights and permissions to a file on their network drive. The user adds three additional individuals to have read-only access to the file. Which of the following would describe this access control model?
Discretionary
44
A remote user has received a text message with a link to login and confirm their upcoming work schedule. Which of the following would BEST describe this attack?
Smishing
45
A company is formalizing the design and deployment process used by their application programmers. Which of the following policies would apply?
Development lifecycle
46
A security administrator has copied a suspected malware executable from a user's computer and is running the program in a sandbox. Which of the following would describe this part of the incident response process?
Containment
47
A server administrator at a bank has noticed a decrease in the number of visitors to the bank's website. Additional research shows that users are being directed to a different IP address than the bank's web server. Which of the following would MOST likely describe this attack?
DNS poisoning
48
Which of the following considerations are MOST commonly associated with a hybrid cloud model?
Network protection mismatches
49
A company hires a large number of seasonal employees, and their system access should normally be disabled when the employee leaves the company. The security administrator would like to verify that their systems cannot be accessed by any of the former employees. Which of the following would be the BEST way to provide this verification?
Validate the offboarding processes and procedures
50
Which of the following is used to describe how cautious an organization might be to taking a specific risk?
Risk appetite
51
A technician is applying a series of patches to fifty web servers during a scheduled maintenance window. After patching and rebooting the first server, the web service fails with a critical error. Which of the following should the technician do NEXT?
Follow the steps listed in the backout plan
52
An attacker has discovered a way to disable a server by sending specially crafted packets from many remote devices to the operating system. When the packet is received, the system crashes and must be rebooted to restore normal operations. Which of the following would BEST describe this attack?
DDoS
53
A data breach has occurred in a large insurance company. A security administrator is building new servers and security systems to get all of the financial systems back online. Which part of the incident response process would BEST describe these actions?
Recovery
54
A network team has installed new access points to support an application launch. In less than 24 hours, the wireless network was attacked and private company information was accessed. Which of the following would be the MOST likely reason for this breach?
Misconfiguration
55
An organization has identified a significant vulnerability in an Internet-facing firewall. The firewall company has stated the firewall is no longer available for sale and there are no plans to create a patch for this vulnerability. Which of the following would BEST describe this issue?
End-of-life
56
A company has decided to perform a disaster recovery exercise during an annual meeting with the IT directors and senior directors. A simulated disaster will be presented, and the participants will discuss the logistics and processes required to resolve the disaster. Which of the following would BEST describe this exercise?
Tabletop exercise
57
A security administrator needs to block users from visiting websites hosting malicious software. Which of the following would be the BEST way to control this access?
DNS filtering
58
A system administrator has been called to a system with a malware infection. As part of the incident response process, the administrator has imaged the operating system to a known-good version. Which of these incident response steps is the administrator following?
Recovery
59
A company has placed a SCADA system on a segmented network with limited access from the rest of the corporate network. Which of the following would describe this process?
Hardening
60
An administrator is viewing the following security log: Dec 30 08:40:03 web01 Failed password for root from 10.101.88.230 port 26244 ssh2 Dec 30 08:40:05 web01 Failed password for root from 10.101.88.230 port 26244 ssh2 Dec 30 08:40:09 web01 445 more authentication failures; rhost=10.101.88.230 user=root Which of the following would describe this attack?
Brute force
61
During a morning login process, a user's laptop was moved to a private VLAN and a series of updates were automatically installed. Which of the following would describe this process?
Configuration enforcement
62
Which of the following describes two-factor authentication?
A Windows Domain requires a password and smart card
63
A company is deploying a new application to all employees in the field. Some of the problems associated with this roll out include: The company does not have a way to manage the devices in the field Team members have many different kinds of mobile devices The same device needs to be used for both corporate and private use Which of the following deployment models would address these concerns?
COPE
64
An organization is installing a UPS for their new data center. Which of the following would BEST describe this control type?
Compensating
65
A manufacturing company would like to track the progress of parts used on an assembly line. Which of the following technologies would be the BEST choice for this task?
Blockchain
66
A company's website has been compromised and the website content has been replaced with a political message. Which of the following threat actors would be the MOST likely culprit?
Hacktivist
67
A Linux administrator is downloading an updated version of her Linux distribution. The download site shows a link to the ISO and a SHA256 hash value. Which of these would describe the use of this hash value?
Verifies that the file was not corrupted during the file transfer
68