CompTIA Certmaster CE Security+ Domain 1.0 General Security Concepts Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Prior to implementing new software integrations on the organization's network, a software specialist evaluates the selected modifications in an environment to ensure the software works correctly and does not cause issues. What concept does the specialist observe with a desire to ensure everything works before implementation?

(A. Impact analysis incorrect)

The organization's engineering team observes a system failure during the implementation of new software patching. From a conceptual standpoint, what can the team use to restore the system to its original state?

(A. Test results B. Maintenance windows incorrect)

A security analyst wants to ensure that the privileges granted to an individual align with the role within the organization. What is the primary tool that the analyst should implement?

(C. Authenticating systems incorrect)

After encountering a cyber attack, an organization uses a monitoring solution that automatically restarts services after it has detected the system has crashed. What type of functional security control is the company implementing?

(C. Technical incorrect)

In a cybersecurity operation where downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and denylists restrictions. The objective is to guarantee high availability (HA) and safeguard against potential security threats. How would a cybersecurity analyst utilize these lists in this scenario? (Select the two best options.)

A. Allowlists can specify approved software, hardware, and change types that are essential for the operation's functioning. D. Denylists can block unauthorized software, hardware, and change types that pose high risk to the operation's availability and security.

A software organization enhances its cyber security by using deception technologies to capture attacker tactics and tools. How can a honeytoken assist in the organization's strategy?

A. It creates false credentials, login credentials, or other data types to distract and gain insight into attackers.

An organization frequently implements changes, reconfigurations, and patches to enhance its IT infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze dependencies between services, applications, and interfaces to avoid unintended outages and disruptions during service restarts or downtime events. How does understanding dependencies impact the change management process? (Select the three best options.)

A. Knowing dependencies helps avoid unintended outages and disruptions during service restarts or downtime events. B. Understanding dependencies guides the development of effective backout plans and downtime contingencies. C. Understanding dependencies supports the development of post-change performance monitoring to validate system functionality and quickly detect issues.

A corporation's IT department is integrating a new framework that permits, ascertains, and applies various resources in accordance with established company policies. Which principle should the department incorporate?

A. Policy-driven access control

A company installed a new locking cabinet in the computer room to hold extra flash drives and other supplies. Which type of security control did the company configure?

A. Preventive

After receiving the annual audit results from the Inspector General's office, a cyber specialist begins identifying points of contact to implement change management on numerous flagged processes. Understanding the various positions tied to change management, which roles would have ownership in the change management process? (Select the two best options.)

A. Project manager C. Team leader

A cybersecurity analyst implements security measures for a financial institution's infrastructure. The analyst explores different technologies to enhance security and must select the appropriate technology to strengthen security within the organization's infrastructure. Which technology should the cybersecurity analyst choose to enhance security for executing sensitive operations and protecting critical data in the financial institution's infrastructure?

A. Secure enclave

A network administrator for a technology company is introducing a new cybersecurity model to limit data breaches. They wish to enforce a strategy where every system or user inside or outside the network perimeter must prove their legitimacy before accessing resources. What principle would be MOST effective in implementing their new strategy?

A. Zero Trust

A systems owner reviews permissions granted to a targeted team of employees and determines that some of the employees' accesses are outside their scope of work. After revoking the certificates, what log does the owner use to record the changes?

B. Certificate Revocation Lists (CRL)

An organization changes its security posture after a breach and wants to enhance encryption by putting measures in place to mitigate risk exposures that cannot be directly eliminated by the cyber security team. What type of control is being observed in this situation?

B. Compensating

A cyber technician reduces a computer's attack surface by installing a cryptoprocessor that a plug-in peripheral component interconnect express (PCIe) adaptor card can remove. What type of cryptoprocessor can support this requirement?

B. Hardware Security Module (HSM)

The organization is implementing a significant software upgrade that necessitates application restarts. How can the cybersecurity analyst ensure a smooth transition without causing extended downtime?

B. Schedule the upgrade during nonworking hours to reduce the impact on users.

An organization has an established change management program that includes standard operating procedures (SOPs). It wants to implement changes consistently and effectively. What role do SOPs play in the change management process?

B. They define routine operations or changes, providing detailed instructions to implement them.

A user in a company wants a new USB flash drive. Rather than requesting one through the proper channel, the user obtains one from one of the company's storage closets. Upon approaching the closet door, the user notices a warning sign indicating cameras are in use. What is the control objective of the observed sign?

C. Deterrent

A senior analyst is purchasing new cybersecurity tools that enhance the ability to detect and defend against various types of attacks. What decoy system can support detection efforts by mimicking specific applications and gathering information on the attacker's tactics and tools?

C. Honeypot

A security specialist updates the organization's change management program after implementing software patching and system updates for the new quarter. In considering the various change management concepts, what is the process of identifying and assessing the potential implications of a proposed change?

C. Impact analysis

A cyber security analyst wants to reduce the attack surface for a computer that contains top secret data. The analyst installs a cryptoprocessor as a module within the central processing unit (CPU) on the designated computer to accomplish this. What type of cryptoprocessor is the analyst installing?

C. Trusted Platform Module (TPM)

How can a cybersecurity analyst effectively utilize version control to maintain a historical record of changes and ensure security in the organization's IT systems and applications?

C. Use version control to track changes in network diagrams and configuration files.

The IT department of a corporation evaluates its security mechanisms to identify areas lacking sufficient protection. Which of the following techniques should the IT department employ?

D. Gap analysis

A malicious actor initiates an attack on a software organization, believing it to have successfully acquired sensitive data. Unbeknownst to the attacker, the organization has deceived the attacker by intentionally providing fake sensitive information and has now captured the attacker's tactics and tools. What deception technology did the organization deploy to capture the attacker's techniques and tools?

D. Honeyfile

An organization has tasked a cyber security technician with enhancing its framework after recently experiencing a cyber breach. What is the value associated with a public key infrastructure (PKI)?

D. It is the framework that establishes trust in using public key cryptography to sign and encrypt messages via digital signatures.


संबंधित स्टडी सेट्स

THESE ARE ALL RIGHT I PROMISE!!! American Government Unit 6 Lesson Lesson 7: The Constitution and Civil Liberties Unit Review

View Set

physiologic changes and assessment during the postpartum period - sherpath

View Set

Acct Exam 2 Q and Brief exercises

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set