Security+ ITProTV Practice Exam I Flashcards
** When connecting to a Website using SSL/TLS, the Client browser uses the Root CA’s Public Key to decrypt the Digital Signature of each Certificate until finally verifying the identity associated with the Website’s Certificate. Which term or phrase describes this PKI concept?
Key Escrow
Certificate Chaining
Key Pairing
Certificate Revocation
Certificate Chaining
Explanation:
Certificate chaining refers to the trust relationships between CAs and helps determine which certificate has the highest level trust. For example, if you get a certificate from “A,” and “A” trusts the root certificate, the highest level trust is the root certificate.
Key escrow addresses the issue that a key might be lost. It is a proactive approach where copies of the private keys are held in escrow (stored) by a third party. The third party (key recovery agent) manages access to and use of the private keys. Keys do not define trust relationships.
A certificate revocation refers to a certificate that has been revoked or is planning on being revoked, for one reason or another. A certificate revocation list (CRL) contains a list of serial numbers for digital certificates that have not expired, but that a certification authority (CA) has specified to be invalid. Typically, the serial number of a digital certificate is placed in a CRL because the digital certificate has been compromised in some way.
In public key cryptography, also known as asymmetric cryptography, every public key pairs to only one private key. Together, these key pairs are used to encrypt and decrypt messages and data that is sent over the internet and the network. Using key pairing can ensure both security and identity of the sender.
** A Hacktivist group claims responsibility for infecting a manufacturer’s systems by planting an infected USB drive at the company’s office. The manufacturer’s distributor, several vendors, and hundreds of customers were all eventually infected with the malware that stole important credential information for those infected.
Which term describes this attack strategy?
Direct Access
Cloud-based
Social Media
Supply Chain
Supply Chain
Explanation:
A supply chain attack is not an attack on a target directly but an attack on a more vulnerable company or resource within its supply chain that helps the organization conduct business or create a product. An increasing number of hacks are being carried out this way.
Direct access is the most straightforward type of attack and hopefully the most preventable. This type of attack is a physical or local attack, such as an attacker exploiting an unlocked workstation and using a boot disk to install malicious tools or simply stealing a device.
Similar to the supply chain attack, hackers may try and exploit vulnerabilities in cloud-based web service providers to gain access to an organization’s data.
Social media attacks occur when malware is attached to posts or presented as downloads on social media sites. At their most dangerous, hackers can make it so a compromised site automatically infects a vulnerable computer
** A man wearing a service provider’s coveralls and carrying a toolbox approaches your facility’s Security guard. He says that his work crew is running some new Ethernet cable inside your office, but he left his mobile phone at home, so he can’t call his crew to let him in. The Security guard admits the man through your Secured door. The following week, you find an undocumented Network device installed in a closet. Which Social Engineering attack techniques were used? (Choose ALL that Apply)
Eliciting Information
Influence Campaign
Impersonation
Identity Fraud
Pretexting
Impersonation
Pretexting
Explanation:
The attacker used pretexting and impersonation to commit physical social engineering. Pretexting (when referring to social engineering) is inventing a scenario that will engage the victim and provide the attacker with an excuse to be in the area. Impersonation is pretending to be an employee, vendor, IT help desk staff, delivery driver, or other individual with some level of legitimate access. Impersonation can occur on the phone or in person. In this scenario, the guard should have asked an employee inside the building to verify that an authorized work crew was on the grounds.
While this was an impersonation, it was not identity fraud. Identity fraud is stealing a specific individual’s PII or credentials to commit financial fraud, elicit information, gain access to confidential records, or penetrate a network. Impersonation is generic, while identity fraud is specific.
The attacker did not elicit information. Eliciting information is tricking the victim into revealing sensitive information, like shift times and manned desk hours, through friendly conversation.
An influence campaign is a multi-actor attack that uses social media accounts to post inflammatory rhetoric and unsubstantiated or fake news stories. The goal of the disinformation is to cause political, social, and economic instability in the target. Influence campaigns are usually conducted by APTs and hostile nation-states.
Physical social engineering uses in-person techniques to gather confidential information or gain access. Other physical social engineering tricks are dumpster diving, shoulder surfing, tailgating / piggybacking, and reconnaissance. Remember that in the CompTIA objectives, reconnaissance can mean visiting a target to observe security controls in person, but it can also refer to digital and remote intelligence gathering techniques using OSINT and automated tools.
** You have been authorized by management to use a Vulnerability Scanner once every three months. What is this tool?
An application that detects when Network intrusions occur and identifies the appropriate personnel.
An application that protects a system against viruses.
An application that identifies ports and services that are at risk on a Network.
An application that identifies Security issues on a Network and gives suggestions on how to prevent the issues.
An application that identifies Security issues on a Network and gives suggestions on how to prevent the issues.
Explanation:
A vulnerability scanner is an application that identifies security issues on a network and gives suggestions on how to prevent the issues. It is a management control type.
A port scanner is an application that identifies ports and services that are at risk on a network.
An intrusion detection system (IDS) is an application that detects when network intrusions occur and identifies the appropriate personnel.
A virus scanner is an application that protects a system against viruses.
** Your organization has decided to implement an Encryption algorithm to protect data. One IT staff member suggests that the organization use IDEA. Which strength Encryption Key is used in this Encryption algorithm?
256-bit
64-bit
56-bit
128-bit
128-bit
Explanation:
International Data Encryption Algorithm (IDEA) uses a 128-bit Encryption Key that encrypt 64-bit blocks of data.
Data Encryption Standard (DES) uses a 56-bit Key to encrypt 64-bit blocks of data.
Some Private Key Encryption standards support 256-bit Encryption Keys.
** Your organization has recently adopted a new organizational Security policy. As part of this new policy, management has decided to implement an Iris Scanner wanting access to the Secure data center. Which procedure does this use to authenticate users?
It takes a picture of the user’s eye and compares the picture with pictures on file.
It scans the shape of the user’s face and compares the face scan with faces on file.
It scans the user’s handwriting and compares the handwriting with a sample on file.
It scans the blood vessels in the user’s eye and compares the pattern with patterns on file.
It takes a picture of the user’s eye and compares the picture with pictures on file.
Explanation:
An iris scanner determines whether to authenticate a user by taking a picture of the iris of the user’s eye and comparing the picture with iris pictures on file.
A retinal scanner determines whether to authenticate a user by scanning the pattern of blood vessels in the user’s eye and comparing that pattern with patterns already on file. A retinal scanner has the lowest crossover error rate and is the most reliable biometric system.
A face recognition scanner determines whether to authenticate a user by scanning the user’s face and comparing that scan to face scans already on file. A facial scan is based on an individual’s bone structure, nose ridge, eye width, forehead structure, and chin shape. A signature scanner determines whether to authenticate a user by comparing the shapes and stroke-timing of a person writing their signature with a signature pattern already on file.
Biometric access control is a security mechanism that makes use of hand scanners, fingerprints, retinal scanners, or DNA structure to identify the user.
** Which of the following scenarios describes a Man-in-the-Browser (MitB) Attack?
When users click on a link in a seemingly legitimate email, malicious payload is downloaded and executed.
When users establish a Session with a legitimate Website, an attacker device eavesdrops on the conversation.
When users install a seemingly legitimate application, a Remote Access Backdoor is also installed.
When users attempt to access a legitimate Website, they are instead redirected to a malicious Website.
When users attempt to access a legitimate Website, they are instead redirected to a malicious Website.
Explanation:
The scenario of being redirected to a malicious website from a legitimate one is a man-in-the-browser attack. The man (or malware) in the browser redirects the user to a fake site rather than the intended site.
When users click on a link in a seemingly legitimate email, and a malicious payload is downloaded and executed, it is an example of malicious links in an email.
When users establish a session with a legitimate website and an attacker device eavesdrops on the conversation, it is a session hijacking attack.
When users install a seemingly legitimate application and a remote access backdoor is also installed, it is an example of a remote access trojan (RAT).
** You perform a Server Scan and find that you have a high amount of Telnet traffic. You have installed several new peripheral devices on the Server. Which newly installed peripheral device is most likely causing this problem?
Wireless Mouse
Printer
Digital Camera
Wireless Keyboard
Printer
Explanation:
Printers and multi-function devices (MFDs), particularly those with networking capability, have the same security concerns as any other device that can be remotely managed. For example, the printer may allow users to connect through Telnet or SSH. If those protocols are not used in your business, turn them off.
Wireless keyboards are subject to keystroke injection. Wireless mice are subject to mouse spoofing. Digital cameras with wireless networking capability should be included in malware scans. However, these devices do not usually need to be remotely managed via Telnet.
Other peripheral devices that may be on the exam include wireless displays, Wi-Fi-enabled MicroSD cards, and external storage devices.
Wireless displays often connect to the Internet to pull in content. If they have a remote management feature, security professionals should determine if that feature uses Telnet or not.
Wi-Fi-enabled MicroSD cards should be included in malware scans.
External storage devices with wireless networking capability should be included in malware scans.
** An advanced user has recently had several new peripheral devices added to his desktop computer. You are concerned about peripheral devices becoming infected with malware. Which peripheral devices should you examine?
(Choose ALL that Apply)
WIFI Enabled MicroSD Cards
Digital Camera
Wireless Mouse
External Storage Devices
WIFI Enabled MicroSD Cards
Digital Camera
External Storage Devices
Explanation:
Malware scans should be performed on Wi-Fi-enabled MicroSD cards, external storage devices, and digital cameras with wireless network capability.
Wireless mice are subject to mouse spoofing, not malware infection. Mouse spoofing involves sending forged signals to the victim’s computer that match the wireless mouse’s protocol. Once the signals are accepted, the attacker can use mouse actions to command the computer to download other attack vectors or turn off anti-virus protection. However, no malware infects the mouse or the victim’s computer. Other peripherals of concern include printers, multifunction devices, wireless keyboards, and wireless displays.
Printers or multi-function devices (MFDs), particularly those with networking capability, have the same security concerns as any other device that can be remotely managed. For example, the printer may allow users to connect through Telnet or SSH. If those protocols are not used, turn them off.
Wireless keyboards are subject to keystroke injection.
Wireless displays often connect to the Internet to pull in content. If they have a remote management feature, security professionals should determine whether that feature uses Telnet. Because they pull content from the Internet, they could also be susceptible to malware attacks.
** Your company has recently started adopting formal Security policies to comply with several state regulations. One of the Security policies states that certain hardware is vital to the organization. As part of this Security policy, you must ensure that you have the required number of components plus one extra to plug into any system in case of a failure. Which strategy is this policy demonstrating?
Cold Site
Fault Tolerance
Clustering
Server Redundancy
Fault Tolerance
Explanation:
Fault tolerance ensures that you have the required number of components plus one extra to plug into any system in case of failure.
Clustering is the process of providing failover capabilities for servers by using multiple servers together. A cluster consists of several servers providing the same services. If one server in the cluster fails, the other servers will continue to operate.
A cold site for disaster recovery includes a basic room with raised flooring, electrical wiring, air conditioning, and telecommunications lines. To properly test disaster recovery procedures at the cold site, alternate telecommunications and computer equipment would need to be set up and configured.
Server redundancy ensures that each server has another server that can operate in its place should the original server fail. Clustering is a form of server redundancy.
As part of any disaster recovery plan, security professionals should ensure that the organization covers the following geographic considerations:
Off-site backups – This ensures that copies of backups are stored off-site in case the primary site is affected by a disaster.
Distance – This ensures that the off-site storage or restoration location is far enough away from the primary site that it is not affected by the same disaster as the primary site.
Location selection – This ensures that a location is assessed to ensure that it is the best location for a backup site. For example, you would want to ensure that the appropriate physical controls are in place to ensure that your backups are protected.
Legal implications – This ensures that any legal implications regarding the off-site storage of data are considered. An organization may be under regulations that prevent certain sites or geographic locations from being used.
Data sovereignty – This ensures that the data is subject to the laws of the location where it is stored. For some organizations, compliance with multiple data sovereignty laws may be necessary.
** You are performing a qualitative Risk Analysis by having experts fill out anonymous questionnaires. Which method are you using?
Pareto Principle
Monte Carlo
Delphi Technique
Decision Tree
Delphi Technique
Explanation:
In the Delphi technique, experts fill out anonymous questionnaires, which keeps one or more experts from dominating the discussion.
The Pareto principle is not a method. It is a principle that states that 80% of consequences come from 20% of the causes.
Monte Carlo analysis is a risk management technique, which project managers use to estimate the impacts of various risks on the project cost and project timeline. It does not have experts fill out anonymous questionnaires.
A decision tree is a decision support tool that uses a tree-like model of decisions and their possible consequences. It does not involve experts filling out anonymous questionnaires.
** You are researching the RSA Encryption algorithm. You need to provide some basic facts about this algorithm to your organization’s management team so they can decide if they want to implement it on the organization’s Network. Which statement is NOT true of this algorithm?
RSA provides both Encryption and Authentication.
An RSA algorithm is an example of symmetric cryptography.
RSA can prevent Man-in-the-Middle attacks.
RSA uses Public and Private Key signatures for integrity verification.
RSA Encryption algorithms do not deal with discrete logarithms.
An RSA algorithm is an example of symmetric cryptography.
Explanation:
RSA is an example of asymmetric cryptography, not symmetric cryptography.
RSA can prevent man-in-the-middle attacks by providing authentication before the exchange of public and private keys. A man-in-the-middle attack is a threat to all asymmetric encryption communications.
RSA does not deal with discrete logarithms. The security provided by RSA is based on the use of large prime numbers for encryption and decryption. It is difficult to factor large prime numbers. Therefore, it is difficult to break the encryption. RSA requires higher processing power due to the factorability of numbers but ensures efficient key management.
RSA is used as the worldwide de facto standard for digital signatures. RSA is a public key algorithm that provides both encryption and authentication. RSA uses public and private key signatures for integrity verification. With public key cryptography, the key is securely passed to the receiving machine. Therefore, public key cryptography is preferred to secure fax messages. When creating a public/private key pair, the RSA algorithm would need a user to specify the key strength.
** Your company needs to protect message integrity. Management decides that you need to implement an algorithm that uses 160-bit checksums. Which algorithm should you implement?
SHA
MD5
AES
DES
SHA (Secure Hashing Algorithm)
Explanation:
SHA = 16-bit checksums
AES = 128-bit checksums, 192-bit and 256-bit Encryption Keys.
MD5 = 128-bit checksums
DES = 56-bit Encryption Keys
** You are designing Security for a new e-commerce Website. You know that you will use HTTPS as the browser protocol. The legal team has asked you to validate using the name of the responsible legal entity in the Certificate, to supply other validation parameters, and to provide a higher level of trust than domain validation. Which certificate would you use?
Extended Validation Certificate
Machine/Computer Certificates
Root Certificates
Email Certificates
Extended Validation Certificates
Explanation:
Extended validation certificates, as the name suggests, provide additional validation for HTTPS web sites. The certificate provides the name of the legal entity responsible for the web site. These certificates require the most effort by the CA to validate and provide a higher level of trust than domain validation because they are validated using more than the domain information.
Machine/computer certificates are assigned to a designated machine. During authentication, the computer (or machine) requesting access must supply the certificate assigned to it. Email certificates are used to secure email. One such example is Secure Multipurpose Internet Mail Extensions (S/MIME), which provides a digital “signature” for that email. Root certificates define the root CA and validate all other certificates issued by that CA. They are at the top of the CA hierarchy. They are self-signed and are closely guarded.
You should also be familiar with wildcard certificates, SAN fields, code signing certificates, user certificates, self-signed certificates, root certificates, and domain validation certificates.
Wildcard certificates allow you to create a certificate in a domain and use that same certificate for multiple subdomains. For example, if you had mail.mysite.com, ftp.mysite.com, and www.mysite.com, you could issue a wildcard certificate for mysite.com, and have it cover all the subdomains. Without the wildcard certificate, you would have to issue a certificate for each subdomain. Subject Alternative Name (SAN) is a field in the certificate definition that allows you to stipulate additional information, such as an IP address or host name, associated with the certificate. Code signing certificates are used for code that is distributed over the Internet, including programs or applications. Code signing certificates verify the code’s origin and help the user trust that the claimed sender is indeed the originator.
Self-signed certificates are digitally signed by the user. This is often provided by Microsoft Internet Information Services (IIS). The self-signed certificate will transmit a public key, but that key will be rejected by browsers. User certificates are assigned to individual users, much like machine/computer certificates are assigned to individual machines. Users must provide their assigned certificate for authentication prior to accessing certain resources. Root certificates define the root CA and validate all other certificates issued by that CA. They are at the top of the CA hierarchy. They are self-signed and are closely guarded.
Domain validation certificates are very common. They are low-cost and are often used by web admins to offer TLS to a domain. They are validated using only the domain name.
** Which of the following sources would provide a Threat Hunter with the most recent software and other Security Vulnerabilities discovered over the past week?
DHS Automated Indicator Sharing Database
US Cert Bulletin
Microsoft Security Response Center Blog
FBI InfraGard Portal
US Cert Bulletin
Explanation:
US CERT Bulletin is a major threat feed used in the security world. Created and maintained by CISA, they use weekly bulletins to provide summaries of new vulnerabilities and possible patch options if and when they become available.
None of the other options provides the most recent software and other security vulnerabilities discovered over the past week.
The Department of Homeland Security (DHS) maintains the free Automated Indicator Sharing (AIS) program that allows organizations to share and obtain machine-comprehensible defensive measures and cyber threat indicators, allowing monitoring and defense of their networks against known threats.
The FBI InfraGard is a partnership between the FBI and members of the private sector in the shared concern for the protection of U.S. Critical Infrastructure. Through unified collaboration, InfraGard unites owners and operators within critical infrastructure to the FBI, to provide education, information sharing, networking, and workshops on emerging technologies and threats that are developing within the US, and round the world.
The Microsoft Security Response Center Blog is created and maintained by Microsoft to help keep up with the ever-evolving threats and better safeguard customers against malicious attacks through timely security updates and authoritative assistance.
** You discover that a malicious program has been installed on several host computers on your Network. This program’s execution was remotely triggered. Of what is this an example of?
Virus
Botnet
Trapdoor
Worm
Botnet
Explanation:
A botnet is formed when a malicious program is installed on several host computers and is remotely triggered. For example, a hacker might install a malicious program on the computers on a network to form a botnet and then remotely trigger the botnet to cause a flood of network traffic. The infected computers then act as “zombies” by performing malicious acts on behalf of the perpetrator. Botnets result in distributed denial-of-service (DDoS) attacks. A good sign that a computer has become part of a botnet is if the browser behaves erratically, performance is slow, and hundreds of outbound connections exist. The most likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network is that the computer is infected with a botnet.
If a computer has been compromised with a botnet, you should shut down the computer. However, keep in mind that the memory, network processes, and system processes will be unavailable for later investigation once the computer is shut down. So, you may need to ensure that the contents of these are captured before shutting the computer down.
A trapdoor is an unreported method for entering a program. A trapdoor is typically created to debug a program, but sometimes hackers can find ways to exploit trapdoors for malicious purposes. A virus is a program that copies itself to files on a computer. A worm is a program that spreads itself through network connections. The main difference between a virus and a worm is that a worm is self-replicating.
** You have been hired as a Security consultant for a large corporation. During a meeting with the IT department, the IT manager indicates that one of their applications uses a Private Key Encryption standard that was developed in Russia and uses 256-bit Encryption Keys. Which Encryption standard does this application use?
RC5
GOST
CAST-128
IDEA
GOST
Explanation:
GOST is a Russian private key encryption standard that uses a 256-bit encryption key. GOST was developed as a counter to the Data Encryption Standard (DES).
CAST-128 is a private key encryption standard that is used in Pretty Good Privacy (PGP). International Data Encryption Algorithm (IDEA) is a private key encryption standard that was developed in Switzerland. IDEA is used in PGP and uses 128-bit encryption keys. RC5 is a private key encryption standard that was developed at the Massachusetts Institute of Technology. RC5 supports variable length encryption keys.
** You are evaluating several biometric authentication systems. Which is the BEST metric to use to quantify the effectiveness of the subject system?
FAR
CER
HOTP
FRR
CER (Crossover Error Rate)
Explanation:
Crossover error rate (CER) is the point where FAR and false FRR are equal. Generally, a lower CER value would indicate a more accurate system. CER is primarily used to compare biometric authentication systems.
False acceptance rate (FAR) is one way to measure the accuracy of a biometric authentication system. It measures how likely it would be that an unauthorized user is granted access to the system. Expressed as a ratio, it is the number of unauthorized users who were incorrectly allowed access to the protected system divided by the number of authentication attempts. A false acceptance can occur, for example, when an unauthorized individual with a dirty finger uses a fingerprint reader and is allowed access to the system. This could happen because the system was not precise enough when matching the authorized user.
By contrast, false rejection rate (FRR) measures how likely it would be that an authorized user is denied access to the system. It is also expressed as a ratio, calculated as the number of authorized users who were denied access to the protected system divided by the number of authentication attempts. False rejections can occur if the system settings are too precise, or if users are not trained properly on biometric login procedures.
HOTP and TOTP are two types of one-time passwords, i.e., they can only be used once. Hashed One Time Passwords (HOTP) are secure passwords used with hardware tokens. Time-based One Time Passwords (TOTP) are issued for a specific period of time. Once used, or once the time expires, the TOTP is no longer valid. As an example of a TOTP, a user forgets a password to a website. When the user clicks the “Forgot Password” link, the website would send a new temporary password to the user but would limit how long the temporary password would be valid. Other considerations include ABAC, proximity cards, smartcards, tokens, CAC, PIV, and file security.
Attribute-based access control (ABAC) goes beyond authentication based on username and password. It evaluates other factors, such as time of day and location of logons. ABAC would also be invoked if a user has read access to files but is attempting to edit or delete files remotely. Smartcards have permissions and access information stored on the card. The greatest concern with smart cards is theft. Once stolen, the thief can use the card in the same manner as the rightful owner. As an example, if the user has access to a highly secure area by using the smartcard, a thief will have the same access when using the stolen card. Proximity cards are a type of smartcard that incorporate Radio Frequency Identification (RFID) chips. These chips contain authentication information and transmit over a very short range. When the authentication device is within range of the proximity card, and the information transmitted is correct, authentication is granted. Hardware tokens (or physical tokens) include such physical devices as wireless key cards, key fobs, and smart cards. Software tokens are a component of two-factor authentication systems. They are usually embedded on a device and used to authenticate the user. A common access card (CAC) is a smart card issued by the Department of Defense (DoD) to military personnel and contractors. They incorporate a picture, integrated chip, two bar codes, and a magnetic strip. They can be used for visual identification and for login.
A personal identity verification (PIV) smart card is issued to non-military federal employees and contractors. They incorporate a picture, integrated chip, two bar codes and a magnetic strip. They can be used for visual identification and for login.
File system security should always be set to only allow what is absolutely essential for the user to do their job. This is also known as the principle of least privilege.
** Management has asked you to implement MD5 to verify data integrity. However, you are concerned that MD5 is not strong enough. Which size checksum does this algorithm produce?
16-bit
56-bit
256-bit
128-bit
128-bit
Explanation:
MD5 = 128-bit
SHA = 160-bit
AES = 128-bit, 192-bit, 256-bit
DES = 56-bit
The MD5 algorithm produces 128-bit checksums to verify integrity of data from a remote user. When you are given the MD5 hash for a file, you can verify that the file has not been tampered with. MD5 derives the hashing function for the challenge response of the Challenge Handshake Authentication Protocol (CHAP). MD5 is a hashing algorithm. If the MD5 hash values of a file do not match, the file has been compromised. You should discard the compromised file. When two completely different files produce the same hash values, this is referred to as a collision. When using Secure Sockets Layer (SSL) to download a file for which you have the MD5 hash, you cannot verify the MD5 hash until after the file is downloaded.
Data Encryption Standard (DES) uses 56-bit encryption keys. Secure Hashing Algorithm (SHA) produces 160-bit checksums. Advanced Encryption Standard (AES) uses 128-bit, 192-bit, and 256-bit encryption keys.
All algorithms are ciphers. Some ciphers are stronger than others. You must consider strong versus weak ciphers and how they will affect your organization. Depending on your organizational needs, you may need to select a weaker cipher for performance reasons. As a security professional, you should ensure that you fully research any ciphers you consider and understand the advantages and disadvantages of each cipher.
** Your company has decided to implement a Biometric System to ensure that only authorized personnel are able to access several secure areas at the facility. However, management is concerned that users will have privacy concerns when the Biometric System is implemented. You have been asked to recommend the Least Intrusive Biometric System of the listed options. Which option is considered Least Intrusive?
Retinal Scan
Voice Print
Iris Scan
Fingerprint
Voice Print
Explanation:
A voice print is considered less intrusive than the other options given. A voice recognition scanner is used to capture a voice print.
Retinal scanners and iris scanners are used to scan the retina and iris, respectively. A fingerprint scanner is used to scan a fingerprint. Both an iris scan and a retinal scan are considered more intrusive because of the way in which the scan is completed. Most people are reluctant to have a scanner read any eye geometrics. A fingerprint scanner is used to scan a fingerprint. A fingerprint scan is more intrusive than a voice print. Most people are reluctant to give their fingerprints because fingerprints can be used by law enforcement. A voice print is very easy to obtain. Its primary purpose is to distinguish a person’s manner of speaking and voice patterns. Voice print systems are easy to implement compared to some other biometric methods. Voice prints are usually reliable and flexible.
A facial recognition scanner is used to scan facial characteristics. A facial scan is based on an individual’s bone structure, nose ridge, eye width, forehead structure, and chin shape.
** Recently, several confidential messages from your company have been intercepted. Your company has decided to implement PGP to encrypt files. Which type of model does this encryption use?
Ring
Web
Bus
Hierarchy
Web
Explanation:
Pretty Good Privacy (PGP) uses a web of trust to validate public key pairs. In a web of trust model, users sign their own key pairs. If a user wants to receive a file encrypted with PGP, the user must first supply the public key. In a public key infrastructure (PKI), certification authorities (CAs) are arranged in a hierarchy and sign public key pairs. Many older Ethernet networks used a bus model for their physical architecture. In a bus network, all computers on a network are connected to a central bus cable. A ring model is used to wire computers in token ring networks. In a ring network, all computers are connected to a physical ring of cable.
Bus and ring are types of networks. Hierarchy is not used by PGP. It can be used in a public key infrastructure (PKI).
GNU Privacy Guard (GPG) is an alternative to the PGP suite of cryptographic software. It uses a combination of conventional symmetric-key cryptography for speed, and public-key cryptography for ease of secure key exchange. GnuPG currently supports the following algorithms: Pubkey: RSA, ElGamal, DSA Cipher: IDEA (from 1.4.13/2.0.20), 3DES, CAST5, Blowfish, AES-128, AES-192, AES-256, Twofish, Camellia-128, Camellia-192, Camellia-256 (from 1.4.10/2.0.12) Hash: MD5, SHA-1, RIPEMD-160, SHA-256, SHA-384, SHA-512, SHA-224
** Your organization is using a STIX/TAXII client to review cyber threat indicators provided by an ISAC. What is the MOST likely source of this information?
Closed-source Intelligence
OSINT
AIS
IoC
AIS (Automated Indicator Sharing)
Explanation:
Automated Indicator Sharing (AIS) is a feed of threat indicators and defensive measures provided to the public by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Users can access it directly through CISA or indirectly through a third-party service.
Structured Threat Information Expression (STIX) defines a common language for discussion threat intelligence and serializes it into a coherent format.
OSINT is freely contributed by various non-profit groups and for-profit sources, including large corporations, and is available in variety of formats, including comma-delimited files (.csv), HTML, and text files (.txt).
Note: OSINT is also the term for a hacker reconnaissance wherein an attacker scans your public information, like websites and social media, to find possible weak points. CompTIA defines OSINT as a threat intelligence source.
Indicators of compromise (IoCs) are the digital signs left in the wake of an attack, such as altered registry keys and file signatures. IoCs are contained in threat feeds, whether they come from closed or open sources.
** You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are evaluating implementation verses algorithm selection? (Choose TWO)
Crypto Modules
Security Through Obscurity
Key Strength
Crypto Service Providers
Key Stretching
Crypto Modules
Crypto Service Providers
Explanation:
You should focus on crypto service providers and crypto modules when you are evaluating implementation versus algorithm selection. Crypto service providers should be able to answer questions regarding which algorithm(s) they use to generate keys and how they store keys. Crypto service providers are parties that provide cryptographic services. An example is Active Directory Certificate Services from Microsoft.
You should select crypto modules to match the type of data to be protected and the equipment on which the module will be deployed. For example, a module for a mobile device should not consume a substantial amount of processing power or battery life. An example is Microsoft Kernel Mode Cryptographic Module. None of the other options are factors that would affect the decision when evaluating a cryptographic solution based on implementation versus algorithm selection.
Key stretching takes a weak key and makes it stronger by adding additional characters. Often, a password is hashed, and a salt is used to make the password stronger. Salting is a form of key stretching.
Security through obscurity is the false confidence that the secret design or implementation is going to be sufficient to provide system safeguards. Often, the system is not all that secure, and the hope is that because no one knows about it, you are therefore protected. Key strength should reflect the sensitivity of the data it protects. Generally, as the need to secure the data increases, so should the strength of the key. Longer keys require more processing power (and time) to break.
** You have just installed a new FTP Server, but you do not know what information the FTP Server is transmitting when a user initially connects to it. Which tool could you use to discover that information, and consequently know what information an attacker could exploit?
Passive Scanner
Active Scanner
Backup Utilities
Banner Grabbing
Banner Grabbing
Explanation:
A network administrator could use banner grabbing to identify information to circumvent that exploit. Banner grabbing intercepts a text file sent by a server or a host. The text file includes OS information and in the case of a web server, perhaps the basic configuration info. The attacker can then exploit that information.
Backup utilities are critical components of network security. Whatever utility you deploy should allow for secure automation.
Passive scanners do not directly interact with the network. An example would be scanning a company’s website. Active scanners use tools like Nessus and Microsoft Baseline Security Analyzer that analyze the network itself. When comparing passive scans to active, passive scans are indirect, typically looking at sites that provide information, and active scans look at the actual network equipment. An active scan is also considered an intrusive scan, and usually provides more meaningful results.