Sec - U - A Flashcards
(539 cards)
Question 1:
An organization is reviewing its encryption strategy to maximize security for its sensitive data. In addition to choosing strong encryption algorithms, what factor should they consider to enhance the security of their encryption?
Key length
Asymmetric
Key exchange
Symmetric
Correct answer
Key length
Asymmetric
Key exchange
Your answer is incorrect
Symmetric
Overall explanation
In addition to selecting strong encryption algorithms, the organization should consider key length to enhance the security of their encryption. Longer keys provide a higher level of security as they are more resistant to brute-force attacks; the more bits in the key, the more possible key combinations there are, making it exponentially harder for an attacker to crack the encryption. This consideration is crucial regardless of whether symmetric or asymmetric encryption is used, as both types of encryption benefit from longer key lengths in terms of increased security against cryptographic attacks.
Question 2:
During an investigation of suspicious network activity, which of the following data sources would MOST likely help identify unauthorized data exfiltration?
Automated reports
Packet captures
Vulnerability scans
Dashboards
Automated reports
Correct answer
Packet captures
Vulnerability scans
Your answer is incorrect
Dashboards
Overall explanation
Packet captures are invaluable in investigations of suspicious activity as they provide a detailed record of network traffic, allowing analysts to see the contents of data being transmitted. This level of detail is crucial for identifying unauthorized data exfiltration. Automated reports, vulnerability scans, and dashboards provide high-level information and might highlight potential issues but lack the granularity to conclusively identify data exfiltration.
Question 3:
To enhance email security, a company implements DKIM. What aspect of email security does DKIM primarily address?
Preventing email spoofing
Encryption of email content
Scanning email attachments for malware
Authentication of email senders
Correct answer
Preventing email spoofing
Encryption of email content
Scanning email attachments for malware
Your answer is incorrect
Authentication of email senders
Overall explanation
DKIM (DomainKeys Identified Mail) primarily addresses the prevention of email spoofing by allowing the receiving email server to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain. This is achieved through the use of a digital signature linked to the domain’s DNS records. While DKIM can indirectly help authenticate email senders, its main purpose is to prevent spoofing by verifying that the message’s content has not been altered in transit, thereby contributing to the overall authenticity and integrity of the email.
Question 4:
To minimize security risks, an organization decides to restrict the use of non-essential software on its networks by implementing a policy that only allows approved applications to operate. What security mechanism does this describe?
Documentation
Downtime
Service restart
Allow lists/deny lists
Documentation
Downtime
Service restart
Your answer is correct
Allow lists/deny lists
Overall explanation
Restricting the use of non-essential software by allowing only approved applications to operate describes the implementation of allow lists/deny lists. This security mechanism is effective in minimizing risks by ensuring that only known, trusted software can run on the organization’s networks, significantly reducing the attack surface. Allow lists/deny lists are more directly related to controlling access to resources and enhancing security than managing operational downtime, the process of service restarts, or the administrative task of updating documentation. This approach emphasizes proactive control over which applications can be executed, thereby protecting the network from unauthorized or potentially malicious software
Question 5:
An organization wants to ensure that only the intended recipients can read the content of their emails, even if intercepted. What feature of PKI is utilized to achieve this?
Key escrow
Private key
Public key
Key exchange
Key escrow
Private key
Correct answer
Public key
Your answer is incorrect
Key exchange
Overall explanation
The public key feature of Public Key Infrastructure (PKI) is utilized to ensure that only the intended recipients can read the content of emails. Senders encrypt emails with the recipient’s public key, and only the recipient’s corresponding private key can decrypt them. This method ensures confidentiality, as intercepted emails remain encrypted and unreadable without the private key. While private keys are crucial for decryption, the use of the recipient’s public key for encryption is what allows for secure, targeted communication. Key escrow and key exchange are important aspects of key management and secure communication but do not directly pertain to the encryption of emails for privacy.
Question 6:
After a cyber incident, an organization conducts a meeting to discuss what happened, how it was handled, and how future incidents can be prevented. What is this process called?
Containment strategy review
Digital forensics report
Root cause analysis
Lessons learned meeting
Containment strategy review
Digital forensics report
Root cause analysis
Your answer is correct
Lessons learned meeting
Overall explanation
The lessons learned meeting is a critical part of the incident response process where stakeholders review the incident, its handling, and outcomes to identify improvements for future responses. This reflective process helps the organization enhance its security posture and response capabilities. Root cause analysis is a part of this meeting but focuses specifically on identifying the underlying cause of the incident. A digital forensics report would provide detailed technical findings, and a containment strategy review would focus on the containment phase specifically.
Question 7:
To ensure that its online services remain available even in the event of a disaster, a company maintains multiple data centers in geographically diverse locations. This strategy primarily enhances which aspect of the CIA triad?
Availability
Integrity
Authentication
Confidentiality
Correct answer
Availability
Integrity
Authentication
Your answer is incorrect
Confidentiality
Overall explanation
Maintaining redundant data centers in geographically diverse locations primarily enhances the availability aspect of the CIA triad. Availability ensures that information and resources are accessible to authorized users whenever needed. By having multiple data centers, the company can guarantee that even if one location is affected by a disaster, the other locations can continue to provide uninterrupted service, thereby ensuring that data and services remain available to users. This focus on uninterrupted access distinguishes availability from confidentiality, which is about preventing unauthorized access, integrity, which ensures data accuracy, and authentication, which verifies user identities.
Question 8:
In the context of security scanning, why is it important to perform both vulnerability scanning and penetration testing on an organization’s infrastructure?
Vulnerability scanning identifies weaknesses, while penetration testing evaluates the impact of exploiting those weaknesses.
Vulnerability scanning is sufficient for compliance purposes.
Penetration testing replaces the need for vulnerability scanning.
Penetration testing is less resource-intensive than vulnerability scanning.
Correct answer
Vulnerability scanning identifies weaknesses, while penetration testing evaluates the impact of exploiting those weaknesses.
Vulnerability scanning is sufficient for compliance purposes.
Penetration testing replaces the need for vulnerability scanning.
Your answer is incorrect
Penetration testing is less resource-intensive than vulnerability scanning.
Overall explanation
Vulnerability scanning and penetration testing are complementary activities; vulnerability scanning identifies potential security weaknesses, while penetration testing actively attempts to exploit these vulnerabilities to evaluate the impact and severity of potential breaches. This combination provides a more comprehensive assessment of security posture than either activity alone.
Question 9:
A company assigns a team to oversee the deployment of a new software platform, including planning, execution, and follow-up. This assignment is an example of establishing what?
Ownership
Stakeholders
Standard operating procedure
Approval process
Correct answer
Ownership
Stakeholders
Standard operating procedure
Your answer is incorrect
Approval process
Overall explanation
Assigning a team to oversee the deployment of a new software platform exemplifies establishing ownership within the change management process. Ownership involves delegating responsibility for specific tasks or projects, ensuring there is a clear point of accountability for planning, execution, and follow-up. This ensures that the change is managed effectively and aligns with the organization’s security policies and business objectives. Ownership is more specific than defining an approval process or identifying stakeholders because it directly assigns responsibility for the successful implementation of the change.
Question 10:
A company requires users to authenticate using a fingerprint and a PIN before accessing the corporate VPN. Which type of multifactor authentication is being used?
Something you are and something you know
Something you know and something you have
Somewhere you are and something you know
Something you have and something you are
Correct answer
Something you are and something you know
Something you know and something you have
Somewhere you are and something you know
Your answer is incorrect
Something you have and something you are
Overall explanation
The combination of a fingerprint (something you are) and a PIN (something you know) represents a use of two different authentication factors, enhancing security by requiring proof of identity from two distinct categories.
Question 11:
During a cyber-attack, what approach ensures system resilience by allowing continuous operation despite some component failures?
Regular patching
Manual monitoring
Redundant systems
Single point of failure
Regular patching
Manual monitoring
Correct answer
Redundant systems
Your answer is incorrect
Single point of failure
Overall explanation
Redundant systems ensure continuous operation by having backup components ready to take over in case of a failure, unlike single points of failure which can lead to complete system shutdowns. Regular patching and manual monitoring are important for security but do not directly contribute to operational continuity in the face of component failures.
Question 12:
During a third-party risk assessment, what is the primary purpose of conducting supply chain analysis?
To identify potential risks introduced by sub-vendors
To evaluate the financial stability of the vendor
To verify the vendor’s compliance with international trade laws
To assess the physical security of the vendor’s premises
Correct answer
To identify potential risks introduced by sub-vendors
To evaluate the financial stability of the vendor
To verify the vendor’s compliance with international trade laws
Your answer is incorrect
To assess the physical security of the vendor’s premises
Overall explanation
The primary purpose of conducting supply chain analysis is to identify potential risks introduced by sub-vendors. This is because sub-vendors or downstream suppliers could introduce vulnerabilities into the supply chain that affect the security and reliability of the primary vendor’s products or services. Assessing physical security and compliance with trade laws are important but not the main focus of supply chain analysis, while evaluating financial stability is more related to the overall vendor assessment than specifically to the supply chain.
Question 13:
A security analyst is conducting a risk assessment on a new software deployment. Which of the following methods would best enable the analyst to prioritize risks based on their severity and likelihood?
Perform a quantitative risk analysis to calculate potential financial impacts.
Review the software’s maintenance schedule in the risk register.
Conduct a qualitative risk analysis to assign severity and likelihood ratings.
Schedule recurring meetings with the software development team to discuss risks.
Perform a quantitative risk analysis to calculate potential financial impacts.
Review the software’s maintenance schedule in the risk register.
Correct answer
Conduct a qualitative risk analysis to assign severity and likelihood ratings.
Your answer is incorrect
Schedule recurring meetings with the software development team to discuss risks.
Overall explanation
Conducting a qualitative risk analysis to assign severity and likelihood ratings is the most effective method for prioritizing risks based on their potential impact and the probability of occurrence. This approach allows the analyst to categorize risks in a way that highlights which ones require immediate attention. While quantitative analysis provides financial impact data, it may not always be practical for new software deployments without historical data. Reviewing maintenance schedules and holding meetings are important for risk management but do not directly help in prioritizing risks.
Question 14:
A multinational corporation is expanding its services to a country with strict data localization laws. What action should the company take to comply with these laws?
Store data locally within the country’s borders
Implement stronger user authentication methods
Encrypt all data in transit
Increase data transfer speeds
Correct answer
Store data locally within the country’s borders
Implement stronger user authentication methods
Encrypt all data in transit
Your answer is incorrect
Increase data transfer speeds
Overall explanation
Storing data locally within the country’s borders is the correct action because it directly addresses data localization laws, which require certain types of data to be stored within the country of origin. Encrypting data in transit, while important for security, does not address the requirement to store data locally. Increasing data transfer speeds and implementing stronger user authentication methods, although beneficial for overall security and performance, do not fulfill the legal requirement imposed by data localization laws.
Question 15:
An organization forms a dedicated security incident response team to handle any security breaches or incidents. Under which category of control does the formation of this team fall?
Physical
Managerial
Technical
Operational
Physical
Managerial
Technical
Your answer is correct
Operational
Overall explanation
The formation of a dedicated security incident response team is an operational control. Operational controls are about the procedures and actions taken by the organization to implement its security policies and respond to incidents. Having a dedicated team ensures that there are specific procedures and resources in place to address and manage security incidents effectively. Unlike managerial controls, which involve the creation of policies and strategies, or technical controls, which use technology to secure the organization’s assets, operational controls are the execution of these policies through specific actions and procedures.
Question 16:
In the context of identity and access management, which of the following best ensures that users have access only to the resources they’ve been explicitly granted?
ABAC
RBAC
MAC
DAC
ABAC
Correct answer
RBAC
MAC
Your answer is incorrect
DAC
Overall explanation
RBAC is effective in ensuring users have access only to what they need according to their role within the organization, aligning with the principle of least privilege. MAC is more about classification and clearance levels, not necessarily about roles. DAC allows owners to decide on access, which could lead to more permissive access than necessary. ABAC can be highly granular but is complex and not inherently about restricting access to only what’s been explicitly granted.
Question 17:
Which agreement type is best suited for establishing the general terms and conditions between an organization and its vendors, which will govern future transactions and services?
MSA
WO/SOW
MOU
SLA
Correct answer
MSA
WO/SOW
MOU
Your answer is incorrect
SLA
Overall explanation
The Master Service Agreement (MSA) is best suited for establishing the general terms and conditions between an organization and its vendors. MSAs define the framework under which future transactions and services will be conducted, making it easier to negotiate future agreements or SOWs. Service-level agreement (SLA) focus on performance metrics and expectations, Memorandum of understanding (MOU) are more about mutual intentions without legal enforceability, and Work order (WO)/statement of work (SOW) detail the specific tasks, timelines, and payments for particular projects.
Question 18:
A government agency requires a method to recover encrypted data in case the original key is lost or the key holder is unavailable. What practice allows for the secure storage and retrieval of cryptographic keys for this purpose?
Key exchange
Key escrow
Private key
Public key
Key exchange
Correct answer
Key escrow
Private key
Your answer is incorrect
Public key
Overall explanation
Key escrow is the practice of storing cryptographic keys securely with a trusted third party, allowing for the recovery of encrypted data if the original key is lost or the key holder is unavailable. This ensures that critical information can be accessed when necessary, while maintaining the security and integrity of the encryption scheme. Unlike public or private keys, which are components of encryption mechanisms, or key exchange, which involves the secure sharing of keys, key escrow specifically addresses the secure storage and retrieval of keys for data recovery purposes.
Question 19:
Which policy would most effectively improve organizational password security?
Banning common passwords and enforcing complexity requirements
Implementing multi-factor authentication
Requiring password changes every 30 days
Allowing unlimited password attempts
Correct answer
Banning common passwords and enforcing complexity requirements
Implementing multi-factor authentication
Requiring password changes every 30 days
Your answer is incorrect
Allowing unlimited password attempts
Overall explanation
Banning common passwords and enforcing complexity requirements most directly improves password security by ensuring that passwords are not easily guessed or cracked through common attack methods. While frequent password changes and multi-factor authentication enhance security, they address different aspects than the inherent strength of the password itself. Unlimited password attempts would decrease security.
Question 20:
A healthcare organization implements end-to-end encryption for all emails containing patient information to prevent unauthorized access during transmission. This initiative primarily enhances which aspect of the CIA triad?
Non-repudiation
Confidentiality
Integrity
Availability
Non-repudiation
Correct answer
Confidentiality
Integrity
Your answer is incorrect
Availability
Overall explanation
End-to-end encryption for emails primarily enhances confidentiality within the CIA triad. Confidentiality is about protecting information from unauthorized access to ensure that it is accessible only to those with proper authorization. By encrypting emails, the healthcare organization ensures that patient information remains confidential during transmission, preventing unauthorized individuals from accessing sensitive data. This measure directly targets the protection of information privacy, distinguishing it from integrity, which ensures data is accurate and unchanged, availability, which ensures information is accessible when needed, and non-repudiation, which prevents denial of involvement in a communication.
Question 21:
To monitor and record activities within its premises, an organization installs surveillance cameras at key locations. Which category of control does this action fall under?
Technical
Managerial
Physical
Operational
Technical
Managerial
Correct answer
Physical
Your answer is incorrect
Operational
Overall explanation
The installation of surveillance cameras at key locations within an organization’s premises is a physical control measure. Physical controls aim to protect the organization’s assets, personnel, and facilities from unauthorized access or harm. Surveillance cameras provide a means of monitoring and recording physical activities, which can deter unauthorized access and provide evidence in the event of security incidents. Unlike technical controls, which deal with the protection of information through technology, or managerial controls, which focus on the policies and strategies for security, physical controls address the physical aspects of security.
Question 22:
A company wants to enhance the privacy of its stored customer data, ensuring that sensitive information is obscured from anyone accessing the database directly. Which technique should they employ to obscure specific data elements, such as Social Security numbers?
Secure Enclave
Data masking
Tokenization
Steganography
Secure Enclave
Correct answer
Data masking
Tokenization
Your answer is incorrect
Steganography
Overall explanation
Data masking is the technique that should be employed to obscure specific data elements, like Social Security numbers, in a database. It involves replacing sensitive information with realistic but non-sensitive equivalents, ensuring that the data remains usable for operational processes while protecting individual privacy. Unlike tokenization, which substitutes sensitive data with non-sensitive tokens that can be mapped back to the original data in a secure environment, or steganography, which hides data within other data, data masking specifically aims to prevent direct access to sensitive data by modifying it within the database. Secure Enclaves provide a hardware-based secure storage but do not specifically address the obscuring of data within stored datasets.
Question 23:
A technology firm is assessing the impact of non-compliance with software licensing agreements. The most immediate and impactful consequence it should anticipate is
A slight increase in operational costs.
Legal action resulting in fines and potential business disruption
A decrease in employee morale.
Mandatory participation in a compliance training program
A slight increase in operational costs.
Correct answer
Legal action resulting in fines and potential business disruption
A decrease in employee morale.
Your answer is incorrect
Mandatory participation in a compliance training program
Overall explanation
The most immediate and impactful consequence of non-compliance with software licensing agreements is legal action, which can lead to significant fines and business disruption. This not only affects the company financially but can also harm its reputation and operational continuity. While an increase in operational costs and a decrease in employee morale may result from non-compliance, they are less immediate and direct consequences. Mandatory compliance training is often a remedial measure rather than an initial consequence of non-compliance.
Question 24:
To protect the entrance of a secure facility from vehicle-based threats, an organization installs reinforced barriers that can stop vehicles in their tracks. Which physical security measure does this describe?
Fencing
Video surveillance
Access control vestibule
Bollards
Fencing
Video surveillance
Access control vestibule
Your answer is correct
Bollards
Overall explanation
Bollards are the physical security measure designed to stop or slow down incoming vehicles, making them an ideal choice for protecting entrances to secure facilities from vehicle-based threats. Unlike access control vestibules, which manage people flow and provide a secured entry point for personnel, fencing, which establishes a perimeter barrier, or video surveillance, which monitors and records activities, bollards specifically provide a strong, physical obstruction to vehicles, enhancing the facility’s physical security against such threats.