SEC - Six - U Flashcards
(45 cards)
Question 1:
During what stage of the account management lifecycle should a user receive his or her first exposure to security awareness training?
Privilege assignment
Deprovisioning
Onboarding
Renewal
Privilege assignment
Deprovisioning
Correct answer
Onboarding
Your answer is incorrect
Renewal
Overall explanation
Security awareness training should begin at the earliest possible stage of the account management lifecycle, which is during onboarding. This ensures that new users understand the organization’s security policies and practices from the start. Deprovisioning, renewal, and privilege assignment occur later in the lifecycle and are not the first opportunities for introducing security awareness training.
This question comes from Security+ exam objective 5.1 Summarize elements of effective security governance.
For more information, see Sybex Security+ Study Guide Chapter 16.
Domain
5.0 Security Program Management and Oversight
Question 2:
Which one of the following attacks exploits a race condition in a software implementation?
TOC/TOU
Buffer overflow
Integer overflow
SQL injection
Correct answer
TOC/TOU
Buffer overflow
Integer overflow
Your answer is incorrect
SQL injection
Overall explanation
A time-of-check/time-of-use (TOC/TOU) attack exploits a race condition by taking advantage of the time lag between when a system checks access permissions and when it uses those permissions. This delay allows an attacker to alter conditions or data between the check and the use, thereby gaining unauthorized access or causing unintended actions.
An integer overflow attack involves manipulating a program to exceed its numerical limits, causing unexpected behavior or errors, but it does not involve timing issues.
A buffer overflow attack occurs when more data is written to a buffer than it can hold, which can overwrite adjacent memory and potentially lead to arbitrary code execution or crashes, but it does not exploit race conditions.
SQL injection is an attack that inserts or manipulates SQL queries to interfere with the execution of database operations, typically used to gain unauthorized access or manipulate data, and it does not rely on timing or race conditions.
This question comes from Security+ exam objective 2.3 Explain various types of vulnerabilities.
For more information, see Sybex Security+ Study Guide Chapter 6.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 3:
Ryan is reviewing logs for his wireless network controller and discovers that a single system attempted to connect to the wireless network once every minute with incorrect credentials until finally logging in successfully after several hours. In reviewing the logs, Ryan noticed that the system had been used by the same user on the network several days ago. What is the most likely explanation of these log entries?
The user’s device was stolen.
The user changed his or her password.
The user’s password was compromised via a brute force attack.
The user fell victim to a social engineering attack.
The user’s device was stolen.
Correct answer
The user changed his or her password.
Your answer is incorrect
The user’s password was compromised via a brute force attack.
The user fell victim to a social engineering attack.
Overall explanation
While any of these explanations are plausible, this pattern of activity is indicative of a password change. After the user changed their password, the device continued attempting to connect with the old, incorrect credentials. The repeated failed attempts reflect the device’s automated retries, which persisted until the user updated the password on the device, allowing it to connect successfully again.
A brute force attack would likely show a much higher frequency of attempts and would not necessarily come from a device previously recognized on the network.
A social engineering attack could lead to compromised credentials, but it would not typically result in the observed pattern of repeated, automated connection attempts with the old password.
If the user’s device was stolen, it would not explain the previous legitimate use of the same system on the network several days ago and the pattern of automated retries seen in the logs.
This question comes from Security+ exam objective 4.9 Given a scenario, use data sources to support an investigation.
For more information, see Sybex Security+ Study Guide Chapter 14.
Domain
4.0 Security Operations
Question 4:
Tom is investigating a report from his organization’s intrusion detection system. After an exhaustive investigation, he determines that the activity detected by the system was actually not an attack. What type of report took place?
False positive
True negative
False negative
True positive
Correct answer
False positive
True negative
False negative
Your answer is incorrect
True positive
Overall explanation
In a true positive report, the system reports an attack when an attack actually exists. A false positive report occurs when the system reports an attack that did not take place. A true negative report occurs when the system reports no attack and no attack took place. A false negative report occurs when the system does not report an attack that did take place.
This question comes from Security+ exam objective 4.3 Explain various activities associated with vulnerability management.
For more information, see Sybex Security+ Study Guide Chapter 5.
Domain
4.0 Security Operations
Question 5:
Darlene is concerned about the level of security at a cloud service provider that her organization is considering using and would like to review the results of an independent audit that verifies that the cloud provider has appropriate controls in place and that they are operating efficiently and effectively. What type of audit report would provide this assurance?
SOC 2 Type 2
SOC 2 Type 1
SOC 1 Type 1
SOC 1 Type 2
Correct answer
SOC 2 Type 2
SOC 2 Type 1
Your answer is incorrect
SOC 1 Type 1
SOC 1 Type 2
Overall explanation
System and Organization Control (SOC) reports provide the results of an independent audit of a service provider. SOC 1 reports are done to verify controls that could impact a client’s financial reporting. SOC 2 reports are done to verify controls that could impact security and privacy of data. Type 1 reports simply verify that controls are in place. Type 2 reports verify that the controls are operating efficiently and effectively. Therefore, Darlene should choose a SOC 2 Type 2 report.
This question comes from Security+ exam objective 5.4 Summarize elements of effective security compliance.
For more information, see Sybex Security+ Study Guide Chapter 5.
Domain
5.0 Security Program Management and Oversight
Question 6:
Harold is designing an access control system that will require the concurrence of two system administrators to gain emergency access to a root password. What security principle is he most directly enforcing?
Least privilege
Two-person control
Security through obscurity
Separation of duties
Least privilege
Correct answer
Two-person control
Security through obscurity
Your answer is incorrect
Separation of duties
Overall explanation
Systems that require two individuals to concur before performing a single action follow the principle of two-person control. This principle ensures that no single person has complete control, reducing the risk of misuse or unauthorized access.
Least privilege involves granting users the minimum level of access necessary to perform their duties, but it is not directly related to requiring two people for a single action.
Separation of duties is about dividing tasks and responsibilities among multiple people to prevent fraud or error, but it does not specifically require two-person control for a single action.
Security through obscurity relies on secrecy for security, which is not relevant to requiring the concurrence of two administrators.
This question comes from Security+ exam objective 4.6 Given a scenario, implement and maintain identity and access management.
For more information, see Sybex Security+ Study Guide Chapter 8.
Domain
4.0 Security Operations
Question 7:
Which one of the following categories of account should normally exist on a secured server?
Guest account
Shared account
Service account
Generic account
Guest account
Shared account
Correct answer
Service account
Your answer is incorrect
Generic account
Overall explanation
Generic, shared, and guest accounts should not be used on secure servers due to their lack of accountability to an individual user. Service accounts normally exist on all servers and are required for routine operation of services.
This question comes from Security+ exam objective 4.6 Given a scenario, implement and maintain identity and access management.
For more information, see Sybex Security+ Study Guide Chapter 8.
Domain
4.0 Security Operations
Question 8:
Don would like to ensure that traveling users are provided with encryption services for all of their network connections while on the road. Which one of the following cryptographic technologies would best meet this need?
SSH
Web browser supporting HTTPS
Encrypted web proxy
VPN
SSH
Web browser supporting HTTPS
Encrypted web proxy
Your answer is correct
VPN
Overall explanation
All of these techniques will provide some degree of cryptographic security. However, the best approach is to use a VPN that will tunnel all communications to the main office over a secure encrypted tunnel. A proxy using HTTPS will only support the specific applications that are proxied. The HTTPS web browser will only encrypt web communications. SSH will only provide encrypted terminal sessions between systems.
This question comes from Security+ exam objective 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
For more information, see Sybex Security+ Study Guide Chapter 12.
Domain
3.0 Security Architecture
Question 9:
Brian is the physical security official for a data center hosting organization. While entering the building this morning, he noticed that one employee used his badge to enter the building and then held the door open for two other employees. Which one of the following situations occurred?
Impersonation
Shoulder surfing
Dumpster diving
Piggybacking
Impersonation
Shoulder surfing
Dumpster diving
Your answer is correct
Piggybacking
Overall explanation
This is a classic example of a piggybacking attack where one person enters a physical facility and then holds the door open for others to enter without requiring that they also use the access control system. In a dumpster diving attack, individuals rummage through the trash searching for sensitive information. In a shoulder surfing attack, the perpetrator looks over the shoulder of an individual while they use a computer. There is no sign that the individuals entering the building without authenticating were making false claims of identity, so there is no evidence of an impersonation attack.
This question comes from Security+ exam objective 2.2 Explain common threat vectors and attack surfaces.
For more information, see Sybex Security+ Study Guide Chapter 9.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 10:
Lila is concerned about the security of a database table that contains Social Security Numbers. The organization needs to maintain this information for tax reporting purposes, but Lila wants to make sure that database administrators are not able to access this very sensitive field. Which one of the following security controls would best meet Lila’s need?
Database activity monitoring
Column-level encryption
Column-level hashing
Database access controls
Database activity monitoring
Correct answer
Column-level encryption
Your answer is incorrect
Column-level hashing
Database access controls
Overall explanation
Lila should encrypt the Social Security Number column using an encryption key that is not known to the database administrators. Hashing is not a good solution because it would not be possible to reverse the hash and retrieve the SSN for tax reporting purposes. Database access controls would not be effective against a database administrator, who likely has the privileges necessary to bypass those controls. Database activity monitoring might detect unauthorized access but cannot prevent it.
This question comes from Security+ exam objective 1.4 Explain the importance of using appropriate cryptographic solutions.
For more information, see Sybex Security+ Study Guide Chapter 7.
Domain
1.0 General Security Concepts
Question 11:
Rory is reviewing an iPhone used by a former employee and finds that the device contains apps that were not purchased through the app store. These apps allow the modification of security controls on the device. What most likely occurred on this device?
Jailbreaking
Geofencing
Tethering
Carrier unlocking
Correct answer
Jailbreaking
Geofencing
Tethering
Your answer is incorrect
Carrier unlocking
Overall explanation
The presence of apps not purchased through the Apple App Store and allowing modification of security controls indicates that the device was likely jailbroken. Jailbreaking removes the restrictions imposed by Apple, enabling users to install unauthorized apps and modify the operating system.
Carrier unlocking involves removing restrictions set by a carrier to allow the phone to be used on different networks but does not affect app installation or security controls.
Geofencing restricts device functionality based on geographic location, which is unrelated to the installation of unauthorized apps.
Tethering allows a device to share its Internet connection with other devices and does not relate to installing unapproved apps or modifying security controls.
This question comes from Security+ exam objective 2.3 Explain various types of vulnerabilities.
For more information, see Sybex Security+ Study Guide Chapter 13.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 12:
Haley recently started a new job and was issued a multifactor authentication token during her account provisioning. The token has a button that she pushes when she wishes to obtain a new authentication code. What algorithm does this token use?
TOTP
TLS
IPSec
HOTP
TOTP
TLS
IPSec
Your answer is correct
HOTP
Overall explanation
Tokens that generate passcodes based upon a counter that increments when the user pushes a button are using the HMAC-based one-time password (HOTP) algorithm. Those that increment automatically based upon the current time are using the time-based one-time password (TOTP) algorithm.
IPSec is a suite of protocols used for securing Internet protocol (IP) communications through authentication and encryption, not for generating authentication codes.
TLS (Transport Layer Security) is a protocol for securing communications over a computer network, not for generating authentication codes.
TOTP generates passcodes based on the current time, not based on a button press and counter increment.
This question comes from Security+ exam objective 4.6 Given a scenario, implement and maintain identity and access management.
For more information, see Sybex Security+ Study Guide Chapter 8.
Domain
4.0 Security Operations
Question 13:
Taylor is building a server where data will be infrequently written but frequently read. He would like to use a redundant storage solution that maximizes read performance. Which one of the following approaches would best meet his needs?
RAID 1
RAID 0
RAID 5
RAID 3
Correct answer
RAID 1
RAID 0
RAID 5
Your answer is incorrect
RAID 3
Overall explanation
RAID 1, also known as disk mirroring, writes identical data to two disks. This approach allows read operations to recover all data by accessing a single disk and is quite efficient for that use. RAID 3 and RAID 5 stripe data across multiple disks and incur overhead in reassembling information that reduces read performance. RAID 0 does not provide redundancy, as it simply stripes data across multiple disks without parity information.
This question comes from Security+ exam objective 3.1 Compare and contrast security implications of different architecture models.
For more information, see Sybex Security+ Study Guide Chapter 9.
Domain
3.0 Security Architecture
Question 14:
Val is conducting a black box penetration test against a website and would like to try to gain access to a user account. If she has not yet gained access to any systems on the target network, which one of the following attacks would be most effective?
Offline brute force
Offline dictionary
Online brute force
Rainbow table
Offline brute force
Offline dictionary
Correct answer
Online brute force
Your answer is incorrect
Rainbow table
Overall explanation
While it is not an incredibly productive attack, an online brute force attack is Val’s only option of the choices provided. Val does not have access to a password file, which would be a requirement for an offline attack, such as an offline dictionary attack, a rainbow table attack, or an offline brute force attack.
This question comes from Security+ exam objective 2.4 Given a scenario, analyze indicators of malicious activity.
For more information, see Sybex Security+ Study Guide Chapter 4.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 15:
Pete is investigating a domain hijacking attack against his company that successfully redirected web traffic to a third party website. Which one of the following techniques is the most effective way to carry out a domain hijacking attack?
DNS poisoning
ARP poisoning
Network eavesdropping
Social engineering
DNS poisoning
ARP poisoning
Network eavesdropping
Your answer is correct
Social engineering
Overall explanation
The most effective way to carry out a domain hijacking attack is through social engineering. This technique often involves tricking individuals into providing access credentials or other sensitive information that can then be used to change domain registration details, thus redirecting web traffic to a third-party site.
ARP poisoning is a method for intercepting network traffic within a local network but does not directly impact domain registrations.
Network eavesdropping involves intercepting communications, which can lead to information theft but not directly to domain hijacking.
DNS poisoning involves corrupting DNS records to redirect traffic, which can cause similar effects but is distinct from gaining control over the domain registration itself.
This question comes from Security+ exam objective 2.4 Given a scenario, analyze indicators of malicious activity.
For more information, see Sybex Security+ Study Guide Chapter 12.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 16:
Dennis is reviewing the logs from a content filter and notices that a user has been visiting pornographic websites during business hours. What action should Dennis take next?
Take no action.
Report the issue to management.
Block access to the websites.
Discuss the issue with the user.
Take no action.
Correct answer
Report the issue to management.
Block access to the websites.
Your answer is incorrect
Discuss the issue with the user.
Overall explanation
Dennis should consult with his manager to determine appropriate next steps. He should not confront the user directly. While his manager may direct him to block the websites, this is a management decision that Dennis should not take himself.
This question comes from Security+ exam objective 4.9 Given a scenario, use data sources to support an investigation.
For more information, see Sybex Security+ Study Guide Chapter 14.
Domain
4.0 Security Operations
Question 17:
Which one of the following awareness exercises is most likely to cause anger among end users?
Reminder emails
Online training
Posters
Phishing simulation
Reminder emails
Online training
Posters
Your answer is correct
Phishing simulation
Overall explanation
It is possible that users will find any cybersecurity awareness efforts annoying. However, phishing simulations have a higher level of risk of angering users because they are deceptive in nature. Organizations should only conduct phishing simulations with the full support of management.
Online training, posters, and reminder emails are more straightforward awareness methods and are less likely to cause significant anger among end users compared to the deceptive approach of phishing simulations.
This question comes from Security+ exam objective 5.6 Given a scenario, implement security awareness practices.
For more information, see Sybex Security+ Study Guide Chapter 16.
Domain
5.0 Security Program Management and Oversight
Question 18:
Kevin runs a vulnerability scan on a system on his network and identifies a SQL injection vulnerability. Which one of the following security controls is likely not present on the network?
IDS
WAF
DLP
TLS
IDS
Correct answer
WAF
DLP
Your answer is incorrect
TLS
Overall explanation
A web application firewall (WAF), if present, would likely block SQL injection attack attempts, making SQL injection vulnerabilities invisible to a vulnerability scanner. A data loss prevention system (DLP) does not protect against web application vulnerabilities, such as SQL injection. An intrusion detection system (IDS) might identify a SQL injection exploit attempt but it is not able to block the attack. Transport layer security (TLS) encrypts web content but encryption would not prevent an attacker from engaging in SQL injection attacks.
This question comes from Security+ exam objective 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.
For more information, see Sybex Security+ Study Guide Chapter 6.
Domain
3.0 Security Architecture
Question 19:
Helen recently moved from the marketing department to the sales department and retained the permissions assigned to her previous job, despite the fact that they are no longer necessary. What security principle does this violate?
Two-person control
Least privilege
Security through obscurity
Separation of duties
Two-person control
Correct answer
Least privilege
Security through obscurity
Your answer is incorrect
Separation of duties
Overall explanation
There is no evidence presented that this violates any separation of duties or two-person control requirements. Security through obscurity is the idea that the details of security controls should be kept secret, which is not an issue in this scenario. The fact that Helen is retaining privileges from a prior position violates the principle of least privilege.
This question comes from Security+ exam objective 2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
For more information, see Sybex Security+ Study Guide Chapter 8.
Domain
2.0 Threats, Vulnerabilities, and Mitigations
Question 20:
Paul is conducting a penetration test and has gained a foothold on a web server used by the target organization. He is now attempting to use that web server to gain access to a file server on the organization’s internal network. What stage of the penetration testing process is Paul in?
Pivot
Reconnaissance
Initial exploitation
Scoping
Correct answer
Pivot
Reconnaissance
Initial exploitation
Your answer is incorrect
Scoping
Overall explanation
Paul has already gained initial access to a system: the web server. He is now attempting to take that access and pivot from the initial compromise to a more lucrative target: the file server.
Reconnaissance involves gathering information about the target before gaining access.
Initial exploitation is the phase where the attacker first gains access to a target system, which Paul has already accomplished.
Scoping involves defining the boundaries and objectives of the penetration test before any active testing begins.
This question comes from Security+ exam objective 5.5 Explain types and purposes of audits and assessments.
For more information, see Sybex Security+ Study Guide Chapter 5.
Domain
5.0 Security Program Management and Oversight
Question 21:
Fred created a set of IP restrictions on his Cisco router using Cisco’s extended access control list (ACL) functionality. What type of access control model is Fred enforcing?
Role-based access control
Rule-based access control
Discretionary access control
Attribute-based access control
Role-based access control
Correct answer
Rule-based access control
Discretionary access control
Your answer is incorrect
Attribute-based access control
Overall explanation
Network access control lists are examples of rule-based access control because the router will make decisions based upon the rules that Fred provides. The router does not know the identity of the user, so it cannot perform role-based or attribute-based access control. Users have no authority to delegate access control decisions, so this is not an example of discretionary access control.
This question comes from Security+ exam objective 4.6 Given a scenario, implement and maintain identity and access management.
For more information, see Sybex Security+ Study Guide Chapter 8.
Domain
4.0 Security Operations
Question 22:
Which one of the following risks would be addressed by applying full disk encryption to a computer?
Insider attack
Theft of the device
Eavesdropping on the network segment used by the device
Malware infection on the device
Insider attack
Correct answer
Theft of the device
Eavesdropping on the network segment used by the device
Your answer is incorrect
Malware infection on the device
Overall explanation
Full disk encryption is effective against data-at-rest situations where the data is not being actively accessed. For example, full disk encryption protects the contents of a lost or stolen device. Full disk encryption is not effective when a user has accessed the device legitimately, so it would not be effective against an insider attack or against malware running within a user account. It also does not protect data in transit so it would not be effective against an eavesdropping attack.
This question comes from Security+ exam objective 1.4 Explain the importance of using appropriate cryptographic solutions.
For more information, see Sybex Security+ Study Guide Chapter 7.
Domain
1.0 General Security Concepts
Question 23:
During a risk assessment, an IT team uses expert judgment and historical data to assign a likelihood and impact rating to each identified risk without using numerical data. What type of risk analysis is being conducted?
Quantitative
Continuous
Qualitative
Recurring
Quantitative
Continuous
Correct answer
Qualitative
Your answer is incorrect
Recurring
Overall explanation
Qualitative risk analysis is being conducted, as it involves using expert judgment and historical data to assign likelihood and impact ratings to risks without relying on numerical data. This approach typically uses descriptive terms like “high,” “medium,” or “low” to evaluate the risks.
Quantitative risk analysis, in contrast, involves numerical data and statistical methods to calculate the potential impact and likelihood of risks.
Continuous risk analysis refers to an ongoing process of regularly reviewing and updating risk assessments, which can involve either qualitative or quantitative methods.
Recurring risk analysis involves conducting risk assessments at regular intervals but does not specify the use of qualitative or quantitative techniques.
This question comes from Security+ exam objective 5.2 Explain elements of the risk management process.
For more information, see Sybex Security+ Study Guide Chapter 17.
Domain
5.0 Security Program Management and Oversight
Question 24:
Which one of the following backup types typically takes the shortest amount of time to perform when done several times per day?
Full backup
Incremental backup
Differential backup
Complete backup
Full backup
Correct answer
Incremental backup
Differential backup
Your answer is incorrect
Complete backup
Overall explanation
Incremental backups only back up files that were changed since the most recent full or incremental backup. Therefore, they are faster than full/complete backups, which would back up all files. Differential backups contain all files modified since the last full or incremental backup and would therefore take longer, as each differential backup in a series grows larger by including all files from previous incremental backups. Each differential backup in a series contains all of the files included in prior differential backups, while each file is only contained in one incremental backup from a series.
This question comes from Security+ exam objective 3.4 Explain the importance of resilience and recovery in security architecture.
For more information, see Sybex Security+ Study Guide Chapter 9.
Domain
3.0 Security Architecture