CompTIA Security+
Which of the following data types have the highest level of data sensitivity? a. Confidential b. Private c. Critical d. Public
a. Confidential Confidential data has the highest level of data sensitivity. It should only be made available to users with the highest level of pre-approved authentication.
Which of the following can be used to enhance privacy data protection? a. Data anonymization b. Public notification c. Data shredding d. Data pulping
a. Data anonymization Data anonymization obfuscates sensitive information in data, which enhances security.
For which of the following systems is resilience through redundancy the least important? a. Desktops b. Servers c. Data d. Networks
a. Desktops Resilience through redundancy is less important for ubiquitous commodities like desktop or laptop computers, which, if necessary, can be quickly replaced.
Joseph, a black hat hacker, is approached by Sigma Technology to check the enterprise's security. He is told that the system is being checked to verify whether the higher-security mode of operations is moved automatically to another version during a cyberattack on the network, making it easier to attack. Which mode should Joseph use to test this vulnerability, and why? a. Downgrade attack because, in a downgrade attack, an attacker forces the system to abandon the current mode of operation and instead move it to implement a less secure mode. b. Ciphertext attack because, in a ciphertext attack, an attacker forces the system to abandon the current mode of operation instead of moving it to implement a less secure mode. c. Attacks on misconfigurations because, in a misconfiguration attack, attackers utilize weak configurations to exploit vulnerabilities. d. Collision attack because, in a collision attack, attackers utilize weak cryptographic algorithms to exploit vulnerabilities.
a. Downgrade attack because, in a downgrade attack, an attacker forces the system to abandon the current mode of operation and instead move it to implement a less secure mode. In a downgrade attack, an attacker forces the system to abandon the current higher-security mode of operation and instead "fall back" to implementing an older and less secure mode. The threat actor can then attack the weaker mode.
Which of the following is a valid biometric authentication method? a. Gait recognition b. Weight recognition c. Height recognition d. Speech recognition Hide Feedback
a. Gait recognition The gait recognition recognizes the manner of walking to authenticate the authorized party.
Which of the following trust models has only one CA signing digital certificates? a. Hierarchical trust model b. Distributed trust model c. Bridge trust model d. Web of trust model
a. Hierarchical trust model In a hierarchical trust model, only one master CA, the root, is responsible for signing the organization's digital certificates. The root signs all digital certificate authorities with a single key.
Which of the following recovery sites is more expensive to maintain? a. Hot site b. Cold site c. Warm site d. Onsite
a. Hot site Hot sites are the most expensive to maintain, as hot sites are equipped with every required working resource.
Why is the UEFI framework considered to be better than the BIOS framework? a. It has a better user interface and supports remote troubleshooting. b. It restricts the hardware support to less than 1TB, offering better security than BIOS. c. It can identify the virus and malware in a device before the system is launched. d. It comes with additional features of OS hardening and anti-intrusion systems.
a. It has a better user interface and supports remote troubleshooting. UEFI provides access to hard drives larger than 2TB, support for unlimited partitions, faster booting, and network functionality.
What is virtual desktop infrastructure? a. It is the process of running a user desktop inside a VM residing on a server. b. It is the process of virtualizing hardware for different uses. c. It is the process of using a virtual network to access the cloud. d. It is the process of maintaining compliance between cloud and on-premises networks.
a. It is the process of running a user desktop inside a VM residing on a server. Virtual desktop infrastructure (VDI) refers to accessing a desktop hosted on another server for use from various devices.
Which of the following refers to the method by which an iOS user can access root privileges on the device? a. Jailbreaking b. Rooting c. Keylogging d. Sideloading
a. Jailbreaking Jailbreaking is how iOS users get access to a UNIX shell with root privileges, essentially allowing them to do anything on the device.
Typically, certain employees of an organization get texts that update them on various IT activities. If there is a support ticket or downtime, they will receive texts to let them know about the activity. They have started to receive some messages via text instructing them to call the IT help desk at the provided number. When they call the help desk number, a recording asks them for their employee ID. Assuming that the IT department did not send those texts, which of the following social engineering attacks is this? a. Smishing b. Whaling c. Spimming d. Vishing
a. Smishing A variation on vishing, smishing uses short message service (SMS) text messages and callback recorded phone messages to trick people into giving up secure information such as Social Security numbers, credit card and banking numbers, or employee ID numbers.
You are the security administrator in your organization and have been asked to choose a deployment method that ensures the utmost security, where the data is stored in a centralized server and can be accessed by authorized employees using their own devices. Which of the following should you choose? a. Virtual desktop infrastructure (VDI) b. Choose your own device (CYOD) c. Corporate-owned personally enabled (COPE) d. Corporate-owned devices (COD)
a. Virtual desktop infrastructure (VDI) Virtual desktop infrastructure (VDI) stores sensitive applications and data on a remote server and can be accessed through employee devices. An enterprise can centrally protect and manage apps and data on the server.
For which of the following is the encapsulating security payload (ESP) protocol applied? a. Authentication b. Confidentiality c. Key management d. Applications
b. Confidentiality Confidentiality is achieved through the encapsulating security payload (ESP) protocol. ESP supports the authentication of the sender and the encryption of data.
What is data masking? a. Encrypting of files to prevent unauthorized access b. Creating the copy of data by obfuscating sensitive elements c. Protecting sensitive data using strong authentication d. Hiding the data to prevent unauthorized access
b. Creating the copy of data by obfuscating sensitive elements Data masking changes sensitive data elements into unintelligible words.
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised credentials to access the network? a. Non-credentialed scan b. Credentialed scan c. Intrusive scan d. Nonintrusive scan
b. Credentialed scan In a credentialed scan, valid authentication credentials, such as usernames and passwords, are supplied to the vulnerability scanner to mimic the work of a threat actor who possesses these credentials
Which of the following are country-specific requirements that apply to data? a. Data minimization b. Data sovereignty c. Data destruction d. Data masking
b. Data sovereignty Data sovereignty is country-specific requirements that apply to data.
Which attack creates false deauthentication management frames that appear to come from another client device, which causes the client to disconnect from AP? a. Bluesnarfing b. Disassociation c. Injecting malware d. Jamming
b. Disassociation An attacker can create false deauthentication or disassociation management frames that appear to come from another client device, causing the client to disconnect from the AP.
Rob made a physical security review report of his organization in which he proposed replacing physical locks with electronic ones. Which of the following is the best justification for Rob to include in his report? a. The maintenance of physical locks is cost-prohibitive for most organizations. b. Electronic locks keep track of the accessing time and user identity. c. Physical locks are time-consuming and easy to forget to lock and unlock. d. Physical locks are difficult for most users to manage.
b. Electronic locks keep track of the accessing time and user identity. Electronic locks can keep track of who accessed the lock and at what time the lock is accessed, which would result in increased security.
Which application intercepts user requests from the secure internal network and then processes them on behalf of the user? a. Reverse proxy b. Forward proxy c. Honeypot d. Sinkhole
b. Forward proxy A forward proxy forwards the user requests from the internal network to the internet.
Which part of the NIST Cybersecurity frameworks defines the activities needed to attain the different cybersecurity results? a. Information sources b. Framework core c. Implementation tiers d. Profiles
b. Framework core The first part of the NIST Cybersecurity frameworks is the framework cores, which are broken down further into four elements and define the activities needed to attain different cybersecurity results.
You have been instructed to set up a system in a conference room where only trusted employees can access both the secure internal corporate network and the internet, and public users are restricted from accessing the internet from the same network. Which protocol or standard should you use? a. EAP-TLS b. IEEE 802.1x c. EAP-FAST d. CBC-MAC
b. IEEE 802.1x The IEEE 802.1x is commonly used on wireless networks. It permits the trusted employees to access both the secure internal corporate network and the internet while restricting public users to internet access only from the same network connection.
Which of the following is a snooping malware? a. Cryptomalware b. Keylogger c. PUP d. Backdoor
b. Keylogger Keyloggers are a type of snooping malware.
Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network? a. Initial compromise b. Lateral movement c. Privilege escalation d. Data exfiltration
b. Lateral movement With advanced privileges, threat actors use lateral movement to tunnel through networks, looking for additional systems they can access from their elevated position.
Your firewall is configured to deny all packets from the address range 192.110.20.30-192.110.20.100, but you want to allow packets from 192.168.20.73. How should you resolve this issue? a. Make an allow rule for the source address 192.168.20.73. b. Make a force allow rule for source address 192.168.20.73. c. Make a deny rule for source address 192.168.20.73. d. Make a log-only rule for source address 192.168.20.73.
b. Make a force allow rule for source address 192.168.20.73. The force allow rule takes precedence, allowing the IP to send and receive packets.
Which devices are used as a contactless alternative to cash or a credit card payment system? a. Bluetooth b. NFC c. RFID d. WLAN
b. NFC Near field communication (NFC) is a set of standards used to establish communication between devices in proximity. Once the devices are brought within four centimeters of each other or taped together, two-way communication is established. The NFC devices are most often used as an alternative to cash or a credit card as a payment method.
You want to use different passwords for different accounts by remembering just one password. Which of the following tools fits your need? a. Hardware module b. Password vault c. Windowed token d. PDKF2
b. Password vault Password vaults can store and retrieve passwords when needed. You only need to remember the credentials to access the password vault.
Which of the following is the Windows network analysis tool that checks the connection to each hop between source and destination? a. Netstat b. Pathping c. Traceroute d. Curl
b. Pathping Pathping is a combination of ping and tracert that tests the connection to each hop.
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the network looking for additional systems accessible through advanced privileges. What should Meta do to gain repeated and long-term access to the system in the future? a. Perform privilege escalation b. Perform backdoor installation c. Perform data exfiltration d. Perform lateral movement
b. Perform backdoor installation Installing backdoors after tunneling through the network using lateral movement gives threat actors repeated and long-term access to the system. The backdoors are not related to the initial vulnerability, so access remains even if the initial vulnerability is corrected.
Which of the following classifications of data is least important? a. Private b. Proprietary c. Confidential d. Sensitive
b. Proprietary Proprietary is the least important classification, as proprietary data is disclosed to trusted third parties.
In a device driver manipulation attack, which of the following changes a device driver's existing code design? a. API attack b. Refactoring c. Improper input handling d. Time of check/time of use in race conditions
b. Refactoring Refactoring is the method used by a threat actor to modify the design of an existing code of a device driver. This can be difficult to detect.
Jennifer created an e-learning web application where a login form has to be filled by the user entering the application. Jennifer created an 8-byte buffer for the user name file while developing the application. One day, the application halted with denial of service. An attack on the web application due to the incorrect entry of input values in the login screen was then discovered. What caused the denial of service issue? a. This is due to a backdoor attack. b. This is due to a buffer overflow attack. c. This is due to a race condition caused by the attack. d. This is due to an application program interface attack.
b. This is due to a buffer overflow attack. A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.
Which of the following only encrypts the IP packet data and leaves the header unencrypted? a. Tunnel mode b. Transport mode c. Encapsulating security payload (ESP) d. Authentication header (AH)
b. Transport mode Transport mode encrypts only the data portion (payload) of each packet but leaves the header unencrypted.
Which of the following best describes password spraying? a. Cracking the password of a user by trying all possible alphanumeric combinations b. Trying a common password on different user accounts c. Creating a wordlist using stolen passwords d. Creating a unique password using uppercase, lowercase, numerals, and special symbols
b. Trying a common password on different user accounts Password spraying is trying a commonly used password on different accounts to gain unauthorized access.
In a practical test, you are given a computer with a Windows host OS. You are asked to install a guest machine with Linux OS. What should you do? a. Use Type I hypervisor program b. Use Type II hypervisor program c. Use a container hypervisor d. Use a hardware hypervisor
b. Use Type II hypervisor program A Type II hypervisor runs the guest machine on the host OS, which is necessary for this scenario.
Which of the following can be used to enforce strong credential policies for an organization? a. Acceptable Use Policy b. Windows Active Directory c. Windows Defender d. Windows Firewall
b. Windows Active Directory Good credential policies can be enforced through Windows Active Directory.
Which of the following is an improvement of UEFI over BIOS? a. Compatible with older devices b. enhanced boot security c. Validates the operating system before loading it. d. Shares the boot log to a secure server.
b. enhanced boot security Boot security is enhanced in UEFI over BIOS.
Accounting is an important security concept in an enterprise environment. Which of the following best describes accounting in this context? a. Accounting refers to keeping track of all financial activities of the enterprise. b. Accounting refers to effective financial management for cybersecurity. c. Accounting refers to recording actions of a user on enterprise resources. d. Accounting refers to maintaining security devices in compliance with enterprise policies.
c. Accounting refers to recording actions of a user on enterprise resources. For enhanced security, accounting records who accessed the network, what resources they accessed, and when they disconnected from the network.
An enterprise's annual financial statement reported an overall profit when there was actually a loss. Which of the following risks has occurred? a. Inherent risk b. Residual risk c. Control risk d. Internal risk
c. Control risk Control risk is the probability that financial statements are materially misstated because of failures in the enterprise's controls system.
Which layer of the OSI model is targeted by the threat actors for layer 2 attack? a. Physical layer b. Application layer c. Data link layer d. Transport layer
c. Data link layer The data link layer is the second layer. It is particularly weak and a frequent target of threat actors. A data link layer attack is also called a layer 2 attack.
Which of the following provides multiple forensic tools in a single interface? a. memdump b. winhex c. FTK imager d. GNU dd
c. FTK imager FTK imager is a forensic suite in which multiple tools are available in a single interface.
The company that developed the office productivity software used on both static and mobile devices by your organization has audited some code and noticed a potential security issue. To address the issue, they have released and automatically scheduled an update to ensure that all users receive it. Which of the following might still be vulnerable after the patch? a. Servers b. Smartphone c. Firmware d. Operating systems
c. Firmware Firmware is software embedded into hardware, providing low-level controls and instructions for the hardware. Updating firmware to address a vulnerability can often be difficult, requires specialized steps, and, in some cases, cannot be patched.
Which of the following types of hackers are strongly motivated by ideology? a. Brokers b. Cyberterrorists c. Hacktivists d. Criminal syndicates
c. Hacktivists Hacktivists are strongly motivated by ideology and often attack to make a political statement.
Which of the following accounts is the least vulnerable to cyberattacks? a. Generic account b. Shared account c. Personal account d. Guest account
c. Personal account Personal accounts will be accessed and managed by a single person, making them the least vulnerable to attacks.
Which of the following social engineering attacks continues to be a primary weapon used by threat actors? a. Vishing b. Spear phishing c. Phishing d. Google dorking
c. Phishing Phishing is considered one of the largest and most consequential cyberthreats facing both businesses and consumers. In the third quarter of 2019, phishing attacks saw a 46% increase from the previous quarter, and it is estimated that this trend will continue.
Identifying the attack, containing its spread, recovering, and improving the defenses can be done by which of the following? a. Using access control lists b. Using access control schemes c. Preparing incident response plans d. Using Weak accounts
c. Preparing incident response plans Preparing incident response plans allows one to handle the attacks and analyze them for better defense in the future.
A zero-day vulnerability has been found in an e-commerce website used to purchase electronics. Neither the website owner nor the general public knows about the vulnerability; it was discovered by a computer security specialist making a purchase. What should the specialist do? a. Make a report of the zero-day vulnerability and launch it to the public to make them aware. b. Be a broker and sell this zero-day vulnerability to the potential buyers so that they can decide for themselves what to do with it. c. Privately share their findings regarding the zero-day vulnerability with the e-commerce company. d. Ignore it; it is not the specialist's job to alert the website's owner about the vulnerability.
c. Privately share their findings regarding the zero-day vulnerability with the e-commerce company. If the vulnerability is shared with the owner or developer of the application, they can then take the appropriate action to either close it or reduce its impact if exploited.
Which of the following best describes attacks due to application vulnerabilities that trick the vulnerable application(s) into producing more executable files in the system? a. Executable files attack b. System tampering c. Process spawning control d. Deprovisioning
c. Process spawning control Process spawning control tricks the vulnerable application into spawning executable files on the system.
When assessing risks, you found that a customer database in your enterprise has a higher risk calculation than a product database and allocated more resources to protect the customer database. Which risk assessment was used here? a. Risk control self-assessment b. Qualitative risk assessment c. Quantitative risk assessment d. Risk likelihood assessment
c. Quantitative risk assessment Quantitative risk calculation attempts to create "hard" numbers associated with a system element's risk by using historical data, by which more resources will be allocated to high-risk entities.
Rachel has taken over as a systems administrator of Creative Network, which has a network of 300 computers in two different domains. Rachel has been instructed by the CEO to ensure all employees have access to a certain set of folders on the server. The individual workstations may have the personal data of employees in a particular folder. She was informed that there have been previous instances where employees misused the machines. What policy should Rachel be setting in individual user machines and servers? a. Rachel should set the least functionality for the server to the users and administrative control on individual desktops. b. Rachel should set administrative functionality for the server to the users and least functionality on the individual desktops. c. Rachel should set the least functionality for both servers and user desktops. d. Rachel should set no access for the server and set administrative rights on desktops.
c. Rachel should set the least functionality for both servers and user desktops. Setting the least functionality for users is the recommended way to protect the network from vulnerability.
Which protocol can send cryptographic confirmation that an endpoint is who it claims to be so that ARP poisoning is hindered? a. DNSSEC b. SFTP c. SEND d. SMTP
c. SEND The secure network discovery (SEND) can confirm that an endpoint is who it claims to be.
Which of the following protocols can protect network equipment from unauthorized access? a. POP3 b. IMAP c. SNMP d. DNSSEC
c. SNMP The simple network management protocol (SNMP) is used to manage networking devices.
Which of the following is a VPN protocol? a. SMTP b. POP3 c. SSTP d. TCP
c. SSTP A secured socket tunneling protocol (SSTP) is a virtual private network (VPN) protocol.
Your enterprise network's security was breached when a non-employee connected a device to the network. In a security review meeting, you were asked to employ appropriate measures to prevent this from happening in the future while, at the same time, continuing to allow outsiders to connect to the network. Which of the following actions should you take? a. Set up a virtual private network b. Set up an access control list c. Set up a network access control d. Set up data loss prevention
c. Set up a network access control Network access control (NAC) examines an endpoint's current state before it can connect to the network. Any device that does not meet a specified set of criteria will be restricted from accessing the network.
Which of the following encrypts one character at a time? a. ECB b. CBC c. Stream d. Block
c. Stream Stream cipher encrypts one character of the plaintext at a time.
David, a software engineer, recently bought a brand new laptop because his enterprise follows the BYOD (bring your own device) model. David was part of a software development project where the software code was leaked before its release. Further investigation proved that a vulnerability in David's laptop caused the exposure. David insists he never used the laptop to access any network or integrate any devices, and the laptop was kept in a vault while not in use. Which of the following attack vectors was used by the threat actor? a. Direct access b. Wireless c. Supply chain d. Removable media
c. Supply chain A supply chain is a network that moves a product from the supplier to the customer. The laptop might be infected by an entity within the supply chain, as all other possibilities are ruled out by the developer's strict acts.
PDC Bank is working on creating an AI application that enables customers to send SMS to the AI application to allow banking activities from their registered ID. Jane, the project engineer, has taken bank customer data from the last few years from the server and is using it to train the ML to recognize and authenticate actual users and to ensure unauthorized users are barred from entering the application. Suppose the AI application has been compromised, and the reason has been identified as compromised data being used to improve the ML accuracy. What kind of attack is the PDC Bank application subjected to? a. Adversarial artificial intelligence b. ML algorithm security c. Tainted training data for ML d. Spyware
c. Tainted training data for ML Tainted ML training data teach the AI application to behave in ways the threat actor would want instead of the actual behavior planned by the developer or the organization.
Which of the following best describes artifacts? a. Methods followed by attackers b. Temporary files stored in the RAM c. Technology devices that may contain evidence d. Permanent files stored on hard disks Hide Feedback
c. Technology devices that may contain evidence Artifacts are technology devices that may contain evidence.
Frank is authorized to issue mandatory security guidelines for IoT device manufacturers in the United States. Which of the following guidelines should Frank NOT issue? a. The devices' embedded systems should use network protocols that have advanced security features. b. The devices should have authentication features. c. The devices should present a cost-effective solution for consumers. d. The devices should receive updates provided by the manufacturer at least once every six months.
c. The devices should present a cost-effective solution for consumers. The device's cost-effectiveness has nothing to do with the betterment of device security; hence, Frank should not include this in the guidelines.
The mean time to recovery (MTTR) of a system is zero. What does this imply? a. The system is not resilient to distractions. b. The system cannot be recovered. c. The system is highly resilient. d. The system cannot be recovered quickly. Hide Feedback
c. The system is highly resilient. If MTTR is zero, the system can be recovered quickly, which implies the system is highly resilient.
Hassan has been asked to choose a mobile management tool that can provide a single management interface for application, content, and device management. Which of the following is the best solution? a. Mobile content management (MCM) tool b. Mobile device management (MDM) tool c. Unified environment management (UEM) tool d. Mobile application management (MAM) tool
c. Unified environment management (UEM) tool UEM is a group or class of software tools with a single management interface for mobile devices and computer devices. It provides capabilities for managing and securing mobile devices, applications, and content.
Which of the following can be a log data source for investigating a security breach? a. rsyslog b. nxlog c. metadata d. journalctl
c. metadata Metadata is data that describes information about other data. Analyzing file, web, mobile, and email metadata can give clues regarding an attack.
Which policy restricts the introduction of malicious programs into an enterprise network or server? a. Asset management b. Onboarding and offboarding c. Data governance d. Acceptable use
d. Acceptable use An acceptable use policy (AUP) is a written policy that defines approved user actions while accessing systems and networking equipment.
John is appointed as a vulnerability assessment engineer in a financial organization. An audit report published by a third-party auditing firm revealed that most of the web servers have cross-site scripting and XML entity injection vulnerabilities. John has been told to perform a vulnerability assessment on these servers to verify if the audit report is valid. He is also told that he should not attempt to engage or exploit any vulnerabilities. By applying his knowledge of vulnerability assessment concepts, which type of vulnerability scanning should John use? a. Nonintrusive b. Intrusive c. Non-credentialed d. Credentialed
d. Credentialed Using a credentialed scan, John can get a deeper insight into the system by accessing a fuller range of the installed software and examining its configuration settings and current security posture. Deeper vulnerability scanning will be needed to discover cross-site scripting and XML entity injection.
Which of the following is an attack that affects data availability? a. Rogue AP b. MAC address c. On-path attack d. DDoS attack
d. DDoS attack A distributed denial-of-service (DDoS) attack is an attack from multiple infected systems that seeks to disrupt the victim, often affecting the system's ability to respond, making the services and data unavailable.
What is NOT a firewall feature? a. Packet filtering b. URL filtering c. Network address translation d. Deceiving attackers
d. Deceiving attackers Attackers are deceived using deception instruments like honeypots and sinkholes.
Which technique added to cryptographic algorithms can change a single character of plaintext into multiple characters of ciphertext? a. Eavesdropping b. Collision c. Confusion d. Diffusion
d. Diffusion Diffusion is added to a cryptographic algorithm to thwart known ciphertext attacks by making the ciphertext more difficult to analyze. Diffusion changes a single character of plaintext into multiple characters of ciphertext.
An attack where the threat actor changes the value of the variable outside of the programmer's intended range is known as _____________. a. Improper input handling b. Race condition c. Buffer overflow d. Integer overflow
d. Integer overflow
Which keys are supposed to be kept confidential and not shared with anyone? a. Public key b. Ephemeral keys c. Key pairs d. Private key
d. Private key A private key, also known as a secret key, can only be shared with the person who has created the key and not with anyone else, making it highly secure. Private keys play an important role in symmetric cryptography, asymmetric cryptography, and cryptocurrencies.
You want to install a non-biometric authentication method to reduce overall costs. Which of the following is the best fit? a. Keystroke dynamics b. Face recognition c. Gait recognition d. Security keys
d. Security keys The security key is a non-biometric authentication method.
Which of the following is NOT a characteristic of a trusted platform module (TPM)? a. TPM provides cryptographic services in hardware instead of software. b. TPM generates asymmetric cryptographic public and private keys. c. TPM can easily be transported to another computer. d. TPM includes a pseudorandom number generator.
d. TPM includes a pseudorandom number generator. A trusted platform module (TPM) does not include a pseudorandom number generator (PRNG).
You are working in a data center when you suddenly notice a fire in the server room. Which of the following measures should you take first to suppress the fire? a. Call the fire station for help b. Use a handheld fire extinguisher c. Use the water sprinkler system d. Use the stationary fire suppression system
d. Use the stationary fire suppression system Since there is no immense fire, using a stationary fire suppression system is the best way to suppress the fire in data centers.
In an interview, you are provided the following statements regarding virtualization security. Which statement should you identify as correct? a. Software-defined visibility (SDV) is a framework that allows users to make any network structure transparent. b. A software-defined network virtualizes parts of the physical network to be more quickly and easily reconfigured. c. A user can make a sandbox before performing extensive modifications or alterations to a virtual machine (VM). d. A guest operating system that has remained dormant is updated when the underlying host operating system is updated
b. A software-defined network virtualizes parts of the physical network to be more quickly and easily reconfigured. A software-defined network can decide the path taken by data as it virtualizes parts of the physical network to be more quickly and easily reconfigured.
What is a thin client? a. A thin client is a computing device with limited storage capacity used for latency reduction. b. A thin client is a computer that runs from resources stored on a central cloud server. c. A thin client is a type of virtualized hardware with computing capabilities. d. A thin client is a computer that runs from resources stored on the localized hard drive.
b. A thin client is a computer that runs from resources stored on a central cloud server. Thin clients connect remotely to the cloud computing environment where applications and data are stored, and processing takes place.
Which wireless probe is designed exclusively to monitor the airwaves for RF transmissions? a. Access point probe b. Dedicated probes c. Desktop probe d. Wireless device probe
b. Dedicated probes The dedicated probe is designed to exclusively monitor the RF for transmissions. Unlike access point probes that serve as both an AP and a probe, dedicated probes only monitor the airwaves. Dedicated probes look much like standard access points.
Bob is sending a message to John. Which algorithm should John use to ensure that Bob is the actual sender of the message and not anyone else? a. Elliptic curve cryptography b. Digital signature algorithm c. Rivet-Shamir-Adleman d. Symmetric cryptographic algorithm
b. Digital signature algorithm The digital signature algorithm is proof that can be provided with asymmetric cryptography. It does this by creating a digital signature, which is an electronic verification of the sender. John can use this option to ensure that the sender is actually Bob.
Shaun is an external penetration testing consultant. The Chief Information Security Officer (CISO) of the organization he is working with indicated that none of the internal higher management executives should receive any kind of spear-phishing emails during Shaun's testing. Which part of the rules of engagement would cover this limitation? a. Authorization b. Internal targets c. Initiation d. Target locations
b. Internal targets Internal targets are an element of the "scope" rule of engagement in a penetration test. All internal targets must be clearly identified for an external third-party gray box test or white box test. These internal targets are owned by the customer, and information about them may include specific IP addresses, network ranges, domain names, or email addresses.
Which of the following systems combines the functions of a printer, copier, scanner, fax machine, and special-purpose computer with a CPU? a. HVAC b. MFP c. SCADA d. UAV
b. MFP Multifunctional printers (MFP) combine the functions of a printer, copier, scanner, and fax machine. These peripheral devices are essentially special-purpose computers with a CPU; a hard drive that stores all received print jobs, faxes, and scanned images; a LAN or wireless LAN connection; a telephone connection for faxes; and a USB port that allow users to print documents stored on that device. Smart MFDs even have an OS that allows additional applications to be installed that extend the abilities of the MFD
Which of the following performs a real-time lookup of a certificate status? a. Certificate repository b. Online certificate status protocol (OCSP) c. Certificate revocation list (CRL) d. Offline CA
b. Online certificate status protocol (OCSP) An online certificate status protocol (OCSP) does a real-time lookup of a certificate's status. The OCSP is called a request-response protocol. The browser sends the certificate's information to a trusted entity like the CA, known as an OCSP responder. The OCSP responder then provides revocation information on that one specific certificate.
In WPA3, what is designed to increase security at the handshake, when keys are being exchanged, even if the password is small or weak? a. OWE b. SAE c. PEAP d. CCMP
b. SAE The WPA3 includes simultaneous authentication of equals (SAE). SAE is designed to increase security at the time of the handshake when keys are being exchanged. The result is that WPA3 can give stronger security, even if short or weak passwords are used.
Which of the below cryptographic protocol is an encrypted alternative to the Telnet protocol used to access remote computers? a. Transport layer security (TLS) b. Secure shell (SSH) c. Secure sockets layer (SSL) d. Secure real-time transport protocol (SRTP)
b. Secure shell (SSH) The secure shell (SSH) is an encrypted alternative to the Telnet protocol used to access remote computers. The SSH is a Linux/UNIX-based command interface and protocol for securely accessing a remote computer.
Which application protocol is used to exchange cyber threat intelligence over HTTP? a. STIX b. TAXII c. TCP d. UDP
b. TAXII TAXII (trusted automated exchange of intelligence information) is an application protocol used to exchange cyber threat intelligence over HTTP.
Which configuration of WLANs has the following flaws? The last PIN character is only a checksum. The PIN is divided into two shorter values. There is no lockout limit for entering PINs. a. WEP b. WPS c. MAC d. WPA
b. WPS Wi-Fi protected setup (WPS) has these flaws. Because the PIN is divided into two shorter values, only 11,000 different PINs need to be attempted before determining the correct value. If the attacker's computer can generate 1.3 PIN attempts per second, the attacker can crack the PIN in less than four hours and become connected to the WLAN. The lack of lockout limits for entering PINs increases the likelihood that an attacker will gain access.
Which of the following is the safest authentication method? a. Authentication using an SMS OTP b. Authentication using a smartphone c. Authentication using security keys d. Authentication using a smart card
c. Authentication using security keys Security keys can authenticate a user when inserted into a port or in proximity to a specific device. It contains all the necessary cryptographic information to authenticate the user.
Which of the following is a physical security measure? a. Secured socket layer b. Full disk encryption c. Industrial camouflage d. Packet analysis
c. Industrial camouflage Industrial camouflage attempts to make the physical presence of a building as nondescript as possible so that, to a casual viewer, the building does not look like it houses anything important. It is a physical security measure.
Which cryptography method provides cryptographic solutions uniquely customized to low-power devices that need to manage resources instead of security constraints? a. Asymmetric cryptography b. Private key cryptography c. Lightweight cryptography d. Symmetric cryptography
c. Lightweight cryptography Lightweight cryptography adds cryptography to low-power devices. It can be a problem because the algorithms require both time and energy, which are typically in short supply for low-power devices and applications needing ultra-fast response times. This results in prioritizing resources rather than security constraints.
Which agreement specifies how confidential material will be shared between certain parties but restricted to others? a. Service-level agreement b. Memorandum of understanding c. Nondisclosure agreement d. Business partnership agreement
c. Nondisclosure agreement A nondisclosure agreement (NDA) is a legal contract between parties that specifies how confidential material will be shared between the parties but restricted to others.
Ricky entered a restricted lab by scanning his finger on the fingerprint scanner outside the door. Which type of authentication credential allowed Ricky to enter the lab? a. Someone you know. b. Something you have. c. Something you are. d. Something you can do.
c. Something you are. "Something you are" refers to biometric authentication that confirms identity using features and characteristics of the individual, like fingerprints.
Which category of cybersecurity vulnerability is exploited by attackers before anyone else knows about it? a. Patches b. Platforms c. Zero day d. Third parties
c. Zero day A zero-day vulnerability is uncovered by the threat actor first. This allows the vulnerability to be exploited by attackers before anyone else even knows it exists.
ABC Automobiles is a large manufacturing company based in Munich, Germany. To ensure productivity, all departments like Finance, Purchase, Sales, R&D, Management, etc., are using computers, and for security, each department is placed in different physical and logical networks while interconnected. Johnson, the Vice President of IT, has requested your service in identifying a problem. Details provided by Johnson and your initial probe include the following: The problem started a few weeks ago in the sales department. Videos of six employees working on the computer are shared outside the organization without the users switching on the cameras or the webcam. Their personal phone numbers and email IDs are also found compromised from these devices. At specific times during the day, these computers exhibited substantial amounts of network traffic. Johnson removed these compromised machines from the network immediately to avoid vulnerabilities spreading in the network. He monitored these machines for any unusual behavior for 40 continuous hours. He could not find anything unusual, except that employees who were using these machines were receiving spam messages on their phones. He also scanned these computers using antivirus software but could not find any viruses. He connected these machines back to the network after these checks, but the computers showed the same behaviors. While the infected machines were off the network, a few other machines started showing similar issues, including sudden network traffic during certain times. During the next three days, the Finance and Purchase departments reported similar complaints on their devices. Johnson was contacted yesterday by the IT admin of Silicon Graphics, saying that their web server crashed. A large number of requests coming from various computers at ABC caused the crash. Silicon Graphics's claims were correct; ABC's computers were sending large amounts of HTTP data packets during the specified time. What is your inference based on the discussion with Johnson? a. This could be a logic bomb attack. b. This could be a rootkit attack. c. This is most probably a backdoor attack. d. This is most probably a bot attack.
d. This is most probably a bot attack. This is a bot attack where the bot herder has created a network of bots from ABC Automobiles' computers. The attacker used these zombies to attack Silicon Graphics at a specific time, causing the webserver to crash with high network traffic for which the webserver was not designed. The herder has also used the bots to compromise personal user details and targeted the users through spamming.
You are the security administrator for an enterprise that follows the bring your own device (BYOD) deployment model. What is the first action that you should take to protect sensitive enterprise data from exposure if an employee device is stolen and can't be located? a. You should seek the help of legal authorities. b. You should search for the thief on your own. c. You should change the data access credentials. d. You should perform a remote wipe.
d. You should perform a remote wipe. Performing a remote wipe will protect the data from being accessed by the attacker.