Practice Exam 2 Flashcards

(25 cards)

1
Q

Which of the following terms describes the process of identifying differences between an organization’s current security posture and its desired security posture?

A

Answer: Gap analysis.

What is Gap Analysis:
Identifies gaps between current and desired security posture

Helps prioritize improvements and reduce risk

Used in planning and compliance efforts

Quick Explanation:
Gap analysis shows what’s missing so the organization can take action to improve security.

Memory Tip:
“Gap Analysis = Find what’s missing.”
(From where you are to where you need to be.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term “Zero Trust security” refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.

A

Answer: False.

What Zero Trust Security is:
No implicit trust — always verify users/devices

Continuous authentication & authorization

Trust is earned, not assumed — even inside the network

False Statement Clarified:
The Control Plane defines and manages policies, while the Data Plane enforces them — the statement reversed their roles.

Memory Tip:
“Zero Trust = Always verify. Trust nothing, verify everything.”
(And remember: Control = policy, Data = enforcement.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?

A

Answer: Adaptive identity

What is Adaptive Identity in Zero Trust:
Part of the Control Plane

Considers user identity, device health, location, network conditions, etc.

Enables real-time, dynamic access decisions based on context

Quick Explanation:
Adaptive identity ensures access is continuously evaluated using multiple risk factors — not just login credentials.

Memory Tip:
“Adaptive = Smart access control.”
(It adjusts based on who you are, what you’re using, and where you are.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key components of the Zero Trust Control Plane’s Policy Decision Point (PDP)? (Select 2 answers)

A

Answer: Policy Engine (PE) and Policy Administrator (PA).

Policy Engine (PE) – makes the decision to allow or deny access

Policy Administrator (PA) – coordinates between PE and enforcement points

Memory Tip:
“PDP = Think & Command”
(PE = Think | PA = Command | PEP = Act)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP).

A

Answer: True.

What the role of the PEP in Zero Trust is:
True – PEP is part of the Data Plane

It enforces access decisions made by the Control Plane (PDP)

Works at the point of access (e.g., network device, app gateway)

Quick Explanation:
PEP acts on instructions from the Policy Administrator and allows or blocks access based on policy.

Memory Tip:
“PEP = Policy Gatekeeper”
(It lets traffic in or stops it, based on PDP’s decision.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

A

Answer: True.

True – It’s a two-door system to prevent tailgating and unauthorized access

Often monitored or controlled by a guard or authentication system

Only one door opens at a time to control entry

Quick Explanation:
A mantrap adds a layer of physical security by forcing step-by-step identity verification.

Memory Tip:
“Mantrap = Two doors, one check.”
(You’re stuck in the middle until verified.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements about honeypots are true? (Select 2 answers)

A

Answer: Honeypots mimic real systems to attract cyber attackers and Honeypots contain apparent vulnerabilities that are closely monitored by a security team.

Mimic real systems to lure attackers

Contain fake vulnerabilities that are monitored by security teams

Quick Explanation:
Honeypots are decoys designed to attract attackers, observe their behavior, and learn about threats without risking real systems.

Memory Tip:
“Honeypot = Fake target, real insight.”
(Catches bad actors while protecting real assets.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a honeynet in the context of cybersecurity?

A

Answer: A network of honeypots.

A network of multiple honeypots

Used to simulate a full environment to attract and study attackers

Helps security teams analyze attack patterns and tools

Quick Explanation:
A honeynet provides a broader, more realistic target for attackers, giving defenders deeper insights.

Memory Tip:
“Honeynet = Honeypots working together.”
(A web of traps for better threat intelligence.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a honeynet example?

A

Answer: A network of fake websites, A network of fake servers, A network of fake databases, and A network of fake file shares.

Fake websites

Fake servers

Fake databases

Fake file shares

Quick Explanation:
A honeynet uses various decoy systems to mimic a real network, trick attackers into engaging, and log their behavior.

Memory Tip:
“Honeynet = Fake network, real data on threats.”
(It’s like a trap city made of fake buildings.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A honeyfile can be any type of file (e.g., a document, email message, image, or video file) containing real user data intentionally placed within a network or system to attract potential attackers or unauthorized users.

A

Answer: False.

What is a honeyfile:
False – A honeyfile does not contain real user data

It’s a decoy file meant to attract and detect unauthorized access

Used to trigger alerts if accessed or exfiltrated

Quick Explanation:
Honeyfiles are fake but convincing files (e.g., “passwords.doc”) designed to bait attackers without exposing real data.

Memory Tip:
“Honeyfile = Fake file, real trap.”
(Never real data—just a lure to catch intruders.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A honeyfile can be used for:

A

Answer: Attracting cyber attackers, Triggering alerts when accessed, and Monitoring network activity.

Attracting cyber attackers

Triggering alerts when accessed

Monitoring attacker activity on the network

Quick Explanation:
Honeyfiles serve as decoys to detect and track unauthorized access early.

Memory Tip:
“Honeyfile = Bait + Alarm + Watch.”
(Catches attackers and lets you know.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a honeytoken?

A

Answer: A unique identifier that is designed to track attackers.

A unique, fake identifier or data piece

Used to track or detect attackers if accessed or used

Can be a fake username, database entry, or file

Quick Explanation:
Honeytokens act as bait data to alert security teams when attackers try to use or steal them.

Memory Tip:
“Honeytoken = Fake key to catch the thief.”
(Triggers alerts when tampered with.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following should not be used as honeytokens? (Select all that apply)

A

Answer: Active user account credentials and Actual URLs to live websites or resources.

Quick Explanation:
Using real accounts or live resources as honeytokens can expose real systems to risk if accessed or abused.

Memory Tip:
“Honeytokens = Fake only, never functional.”
(Don’t risk real assets!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:

A

Answer: BIA (business impact analysis).

What is BIA (Business Impact Analysis):
A process to assess the impact of disruptions on business functions

Identifies critical systems and prioritizes recovery steps

Helps estimate downtime tolerance and potential losses

Quick Explanation:
BIA helps organizations plan for and recover from outages or disasters effectively.

Memory Tip:
“BIA = What breaks, how bad, and how fast to fix.”
(Essential for continuity planning.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as:

A

Answer: PKI (public key infrastructure)

What is PKI (Public Key Infrastructure):
A hierarchical system for managing digital certificates

Handles creation, storage, distribution, and revocation

Uses a Certificate Authority (CA) to verify trust

Quick Explanation:
PKI enables secure communication and identity verification using encryption and digital signatures.

Memory Tip:
“PKI = Trust tree for digital keys.”
(It builds and manages secure identities.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the answers listed below best describes the characteristics of a public-private key pair?

A

Answer: A pair of keys where one is used for encryption and the other for decryption.

What best describes a public-private key pair:
A matched pair of cryptographic keys

One key encrypts, the other decrypts

Public key is shared; private key is kept secret

Quick Explanation:
Used in asymmetric encryption, this key pair ensures confidentiality, integrity, and authenticity in secure communication.

Memory Tip:
“Lock with one, unlock with the other.”
(Public to lock, private to unlock.)

17
Q

What is the typical use of a public key?

A

Answer: Data encryption.

Used for data encryption

Shared openly to let others securely send info

Also used to verify digital signatures

Quick Explanation:
The public key lets anyone encrypt data, but only the holder of the private key can decrypt it.

Memory Tip:
“Public locks it, private unlocks it.”
(Public key = encryption tool)

18
Q

Key escrow is a cryptographic technique that enables storing copies of encryption keys with a trusted third party. A Recovery Agent (RA) is a trusted third party (an individual, entity, or system) who is authorized to assist in the retrieval of encryption keys and data on behalf of the data owner. Key escrow and RA are both used to ensure that encrypted data can be decrypted even if the data owner loses access to their encryption key. Since key escrow and RAs are both components of a single security solution, the only way to implement key escrow systems is with the use of RAs.

A

Answer: False.

Q: Is using a Recovery Agent the only way to implement key escrow?

Key Points:
Key escrow = Storing encryption keys with a trusted third party

Recovery Agent (RA) = A person or entity authorized to retrieve keys

Other escrow methods exist that don’t rely on RAs (e.g., automated systems, hardware modules)

Quick Explanation:
While RAs are commonly used in key escrow systems, they’re not the only method for implementing them.

Memory Tip:
“Escrow ≠ RA only — it’s just one way.”

19
Q

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

A

Answer: SED (self encrypting drive).

Q: What is a Self-Encrypting Drive (SED)?

A storage device with built-in hardware encryption

Encrypts/decrypts data automatically with no user action

Often uses a password or key to unlock the drive

Quick Explanation:
SEDs protect data at rest by ensuring everything written to the drive is encrypted by default, with minimal performance impact.

Memory Tip:
“SED = Storage with built-in shield.”
(Encryption is always on, behind the scenes.)

20
Q

Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?

A

Answer: FDE (full disk encryption).

Q: What is Full Disk Encryption (FDE)?

Software-based encryption for the entire storage device

Protects all data at rest, including system and temp files

Requires authentication (e.g., password or key) to boot/access

Quick Explanation:
FDE encrypts everything on a disk so that unauthorized users can’t access any data without the correct credentials.

Memory Tip:
“FDE = Freezes the whole disk until unlocked.”
(Total protection from boot-up to shutdown.)

21
Q

An MS Windows component that enables encryption of individual files is called:

A

Answer: EFS (encrypting file system).

File-level encryption on NTFS drives

Built into Windows (Pro & Enterprise)

Encrypts individual files/folders (not entire drive)

Uses user-specific certificates for access

Encryption is transparent to authorized users

Helps protect data if device is lost/stolen

Supports recovery agents in case of key loss

Memory Tip:
EFS = Encrypt Files Specifically (not full disk)

22
Q

Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)

A

Answer: GPG (GNU privacy guard) and PGP (pretty good privacy).

Q: What are GPG and PGP used for?

Software tools for encrypting data

Secure communications and file storage

Use public-key cryptography (asymmetric encryption)

Protect data confidentiality and authenticity

Quick Explanation:
Both GPG and PGP help users encrypt and sign emails, files, and messages to keep data private and verify the sender.

Memory Tip:
“GPG/PGP = Privacy guards for your data.”

23
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A

Answer: HTTPS

Q: What is HTTPS?

Network protocol for secure web traffic

Uses SSL/TLS encryption to protect data

Ensures confidentiality, integrity, and authentication

Commonly seen as “https://” in URLs

Quick Explanation:
HTTPS encrypts data between your browser and website to prevent eavesdropping or tampering.

Memory Tip:
“HTTPS = Secure HTTP.”
(Lock icon means your data is safe.)

24
Q

Which of the answers listed below refers to a deprecated TLS-based method for secure transmission of email messages?

A

Answer: SMPTS

Q: What is SMPTS?

Deprecated method for secure email transmission

Uses TLS encryption over SMTP protocol

Replaced by more modern, secure methods

Quick Explanation:
SMPTS tried to secure emails by wrapping SMTP with TLS but is now outdated and less used.

Memory Tip:
“SMPTS = Old secure email method (deprecated).”

25
Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?
Answer: SHTTP Q: What is SHTTP? Obsolete protocol for secure web data transfer Different from HTTPS (which is widely used today) Designed to secure individual HTTP messages, not whole sessions Replaced by HTTPS as the standard for web security Quick Explanation: SHTTP was an early attempt to secure web data but never gained wide adoption. Memory Tip: “SHTTP = Old, replaced by HTTPS.”