Security Operations 1 Flashcards
(120 cards)
A company implements a secure baseline across its network but finds that some systems are slowly drifting from the baseline configuration due to ad hoc changes by administrators. What is the BEST way to ensure continuous compliance?
A) Manually audit each system monthly
B) Implement a configuration management tool to monitor and enforce baselines
C) Require administrators to manually reapply security settings weekly
D) Deploy a zero-trust model to restrict administrator access
Answer: B) Implement a configuration management tool to monitor and enforce baselines
Explanation: Configuration management tools automate the enforcement of security baselines, ensuring that systems do not drift from approved configurations.
A cybersecurity team is tasked with implementing a layered security approach to protect an enterprise network. They decide to enforce strong user authentication, segment the network, apply endpoint protections, and monitor network traffic. Which security concept are they applying?
A) Zero trust architecture
B) Principle of least privilege
C) Role-based access control (RBAC)
D) Defense in depth (DiD)
✅ Correct Answer: D. Defense in depth (DiD)
Explanation: Defense in depth (DiD) is a layered security strategy that includes multiple security controls, such as authentication, network segmentation, endpoint protection, and monitoring, to protect against threats at different levels.
❌ Incorrect Answers:
A. Zero trust architecture (ZTA) focuses on strict access control and assumes no implicit trust, but DiD is broader and includes multiple layers of security.
B. Least privilege limits user permissions but does not encompass network segmentation, endpoint security, or traffic monitoring.
C. RBAC manages permissions based on user roles but is not a full security layering strategy.
A company has a bring-your-own-device (BYOD) policy that allows employees to use personal smartphones for work-related tasks. The security team is concerned about the risks associated with personal mobile devices connecting to the corporate network. Which of the following BEST mitigates these risks?
A) Require employees to use company-provided mobile devices
B) Implement a Mobile Device Management (MDM) solution
C) Disable wireless connectivity on personal devices
D) Restrict all personal devices from the network
Answer: B) Implement a Mobile Device Management (MDM) solution
Explanation: MDM solutions enforce security policies on mobile devices, ensuring compliance through encryption, remote wipe, patch management, and controlled network access.
A network administrator is setting up a wireless network for a corporate office. Before deploying access points, they conduct a thorough assessment of the building to identify potential interference and signal coverage issues. What is this process called?
A) Heat mapping
B) Wireless penetration testing
C) Site surveying
D) Frequency hopping
Answer: C) Site surveying
Explanation: Site surveys help identify physical obstacles, existing networks, and optimal placement for wireless access points (APs) before deployment.
A healthcare organization allows doctors to use their personal mobile devices to access patient records while working remotely. The IT department is concerned about securing sensitive data while ensuring device compatibility with the hospital’s network. Which solution BEST addresses this concern?
A) Require all employees to use corporate-owned devices
B) Implement a Mobile Device Management (MDM) solution to enforce security policies
C) Restrict mobile access to only Wi-Fi networks within the hospital
D) Disable mobile device access and require the use of desktop computers
Answer: B) Implement a Mobile Device Management (MDM) solution to enforce security policies
Explanation: MDM solutions allow organizations to apply security controls, such as device encryption, remote wipe capabilities, and access policies, while maintaining compatibility with BYOD devices.
A security engineer is configuring the wireless security settings for an enterprise network. The goal is to ensure that even if an attacker captures encrypted Wi-Fi traffic, they will not be able to decrypt past communications if the network password is compromised. Which security feature should be implemented?
A) WPA2-PSK with AES
B) WPA3-Personal with Simultaneous Authentication of Equals (SAE)
C) WEP with Open Authentication
D) WPA2-Enterprise with Pre-Shared Keys (PSKs)
Answer: B) WPA3-Personal with Simultaneous Authentication of Equals (SAE)
Explanation: WPA3-Personal uses SAE, which replaces pre-shared keys (PSK) and ensures perfect forward secrecy, preventing past communications from being decrypted even if credentials are stolen.
A developer is implementing input validation on a web application to prevent injection attacks. Which of the following is the MOST secure method of input validation?
A) Allowing special characters but limiting their frequency
B) Client-side validation only
C) Input deny listing
D) Input allow listing
✅ Correct Answer: D. Input allow listing
Explanation: Input allow listing is the most secure method because it defines explicitly permitted inputs while blocking all others, reducing the risk of SQL injection, XSS, and command injection attacks.
❌ Incorrect Answers:
A. Allowing special characters but limiting their frequency does not fully prevent injection attacks.
B. Client-side validation alone is insufficient because attackers can bypass it by modifying requests.
C. Input deny listing is weaker because attackers can find ways around blacklisted inputs.
A cybersecurity team is testing a new application update for vulnerabilities before deploying it to production. They want to ensure the update does not negatively impact existing systems. Which technique should they use?
A) Continuous monitoring
B) Sandboxing
C) Dynamic analysis
D) Code obfuscation
Answer: B) Sandboxing
✔ Correct Explanation: Sandboxing isolates applications in a controlled environment, allowing teams to safely test updates, patches, or new software before deployment.
✘ Incorrect Answers:
A) Continuous monitoring – This detects vulnerabilities over time but does not isolate applications before deployment.
C) Dynamic analysis – This tests software during runtime but does not necessarily isolate it from affecting production systems.
D) Code obfuscation – This is used to make source code harder to analyze, not to test applications in an isolated environment.
A company is acquiring a new third-party software application to manage sensitive customer data. To ensure security during the procurement process, which of the following should be the FIRST step?
A) Require all employees to sign a non-disclosure agreement (NDA) before using the application
B) Deploy the application in a test environment before a security review
C) Install the application on production servers and monitor for potential vulnerabilities
D) Review the vendor’s security policies, certifications, and compliance with industry regulations
✅ Correct Answer: D. Review the vendor’s security policies, certifications, and compliance with industry regulations
Explanation: Before deploying third-party software, the first step in procurement security is to evaluate the vendor’s security policies, certifications, and regulatory compliance to ensure the software meets security standards.
❌ Incorrect Answers:
A. NDAs protect sensitive discussions but do not assess software security.
B. Testing the application is important but should be done after reviewing vendor security practices.
C. Installing software on production servers before evaluation is risky and could expose customer data to vulnerabilities.
A security analyst is responsible for securely decommissioning outdated file servers that contain sensitive financial data. What is the FIRST step that should be performed before disposal?
A) Format the hard drives and reinstall the operating system
B) Perform data sanitization to ensure no residual data remains
C) Physically remove the servers from the data center
D) Shred the hard drives without verifying stored data
Answer: B) Perform data sanitization to ensure no residual data remains
✔ Correct Explanation: Data sanitization ensures that all sensitive data is irreversibly removed before the servers are decommissioned and disposed of, preventing unauthorized recovery.
✘ Incorrect Answers:
A) Format the hard drives – Formatting does not permanently remove data; data can still be recovered.
C) Physically remove the servers – Moving the servers does not address data security.
D) Shred the hard drives without verifying stored data – Data should be sanitized first to prevent unnecessary loss or destruction of important records.
A security analyst needs to assess a company’s internal network for vulnerabilities without disrupting normal business operations. The scan should provide an in-depth view of potential weaknesses while minimizing network impact. Which of the following is the BEST type of scan to perform?
A) Non-credentialed, intrusive scan
B) Credentialed, non-intrusive scan
C) Non-credentialed, non-intrusive scan
D) Credentialed, intrusive scan
Answer: B) Credentialed, non-intrusive scan
✔ Correct Explanation: A credentialed, non-intrusive scan allows deep insight into vulnerabilities while minimizing disruption to business operations.
✘ Incorrect Answers:
A) Non-credentialed, intrusive scan – This is aggressive and may miss internal vulnerabilities since it lacks credentials.
C) Non-credentialed, non-intrusive scan – Limited to publicly accessible information, missing internal security gaps.
D) Credentialed, intrusive scan – Can identify deep vulnerabilities but may cause system instability during execution.
A penetration tester is hired to evaluate a web application’s security. The tester is required to analyze the application’s source code to detect potential flaws without executing it. Which method should they use?
A) Static analysis
B) Dynamic analysis
C) Package monitoring
D) Threat feed monitoring
Answer: A) Static analysis
✔ Correct Explanation: Static analysis reviews source code for vulnerabilities without execution, allowing early detection of security flaws.
✘ Incorrect Answers:
B) Dynamic analysis – Executes the code and observes runtime vulnerabilities, but does not inspect the source code directly.
C) Package monitoring – Analyzes network traffic, not application code.
D) Threat feed monitoring – Provides external threat intelligence, not application-specific vulnerability detection.
A penetration tester is hired to assess an organization’s network security. The tester is provided with some internal documentation about the network architecture and system configurations but is not given full administrative access. Which type of test is being performed?
A) Black-box testing
B) White-box testing
C) Gray-box testing
D) Vulnerability scanning
Answer: C) Gray-box testing
✔ Correct Explanation: Gray-box testing provides the tester with partial knowledge of the system while still requiring them to identify vulnerabilities as an external attacker would.
✘ Incorrect Answers:
A) Black-box testing – The tester has no prior knowledge of the system.
B) White-box testing – The tester has full knowledge and access to the system.
D) Vulnerability scanning – This identifies vulnerabilities but does not involve active exploitation like penetration testing.
A software development company is analyzing application source code before deployment to identify vulnerabilities such as buffer overflows and SQL injection flaws. What technique is the company using?
A) Input deny listing
B) Code obfuscation
C) Dynamic code analysis
D) Static code analysis
✅ Correct Answer: D. Static code analysis
Explanation: Static code analysis examines source code without executing it to detect vulnerabilities such as buffer overflows, SQL injection, and insecure coding practices before deployment.
❌ Incorrect Answers:
A. Input deny listing blocks specific inputs but does not analyze source code.
B. Code obfuscation makes code harder to read but does not identify vulnerabilities.
C. Dynamic code analysis tests applications while running, but this question specifies before deployment.
An organization wants to allow employees to use personal devices for work but needs to enforce security controls such as encryption, remote wipe capabilities, and app restrictions. Which deployment model is the organization using?
A) Corporate-Owned, Personally Enabled (COPE)
B) Bring Your Own Device (BYOD)
C) Choose Your Own Device (CYOD)
D) Corporate-Owned, Restricted Use
Answer: B) Bring Your Own Device (BYOD)
Explanation: BYOD allows employees to use personal devices for work while MDM solutions enforce security measures to mitigate risks.
A new security analyst has been assigned to a government contract requiring strict compliance with NIST guidelines. The analyst is tasked with establishing a secure baseline for all newly deployed systems. What should be the FIRST step in this process?
A) Deploy the baseline across all systems
B) Apply vendor security patches to all existing devices
C) Review industry and regulatory standards to define the baseline
D) Perform vulnerability scanning to detect deviations
Answer: C) Review industry and regulatory standards to define the baseline
Explanation: Establishing a secure baseline starts with referencing industry standards (e.g., NIST, CIS benchmarks) to ensure compliance before deployment.
A security consultant is analyzing a company’s wireless infrastructure and notices that access points are placed in areas with high levels of interference. Employees report weak signal strength and frequent disconnections. What should the consultant recommend FIRST?
A) Reduce the number of access points to limit interference
B) Increase the power output of all access points
C) Disable encryption to improve network performance
D) Relocate access points based on a heat map analysis
✅ Correct Answer: D. Relocate access points based on a heat map analysis
Explanation: A heat map analysis helps identify signal strength and interference areas, allowing optimal placement of access points to improve connectivity and reduce interference.
❌ Incorrect Answers:
A. Reducing the number of access points could make coverage worse, not better.
B. Increasing power output may cause overlapping interference, worsening the issue.
C. Disabling encryption does not improve signal strength and introduces security risks.
An administrator wants to harden workstations to reduce the attack surface. Which of the following measures should be implemented?
A) Disable unused services and ports, enforce screen locks, and install host-based firewalls
B) Enable all network services for compatibility, increase administrator privileges, and disable logging
C) Configure weak passwords for user convenience, install anti-virus software, and disable firewalls
D) Implement a guest network for workstation access, reduce password complexity, and allow USB device access
Answer: A) Disable unused services and ports, enforce screen locks, and install host-based firewalls
Explanation: Hardening workstations involves reducing attack surfaces by disabling unnecessary services, enforcing strong authentication, and applying host-based firewalls and IDS/IPS.
A financial institution wants to install a secure wireless network in its headquarters. The security team is concerned about unauthorized access and eavesdropping. Which of the following actions should be taken to enhance wireless security?
A) Disable SSID broadcast, enable WPA3 encryption, and use strong authentication protocols
B) Use WEP encryption, increase the signal strength, and allow open guest access
C) Deploy access points without encryption but monitor traffic for anomalies
D) Rely on MAC address filtering alone to prevent unauthorized access
Answer: A) Disable SSID broadcast, enable WPA3 encryption, and use strong authentication protocols
Explanation: WPA3 encryption provides the highest security, disabling SSID broadcast reduces visibility to attackers, and strong authentication (e.g., 802.1X) ensures only authorized users gain access.
A university wants to allow students from different institutions to seamlessly authenticate to its Wi-Fi network using credentials from their home institutions. Which authentication system should be implemented?
A) MAC address filtering
B) WPA3-Enterprise
C) Wi-Fi Protected Setup (WPS)
D) RADIUS federation
✅ Correct Answer: D. RADIUS federation
Explanation: RADIUS federation allows users to authenticate across multiple institutions using their home institution’s credentials. This is commonly used in eduroam, a global education roaming network.
❌ Incorrect Answers:
A. MAC address filtering is not an authentication system and can be easily bypassed.
B. WPA3-Enterprise improves security but does not provide cross-institution authentication.
C. WPS is insecure and does not handle authentication for multiple institutions.
A cybersecurity analyst is testing a web application and notices that it does not validate user input. What type of attack is the application MOST vulnerable to?
A) DNS poisoning
B) Man-in-the-middle (MITM)
C) Denial-of-service (DoS)
D) Cross-site scripting (XSS)
✅ Correct Answer: D. Cross-site scripting (XSS)
Explanation: XSS attacks occur when user input is not properly validated, allowing attackers to inject malicious scripts into web pages viewed by other users. This can lead to session hijacking, credential theft, and unauthorized actions.
❌ Incorrect Answers:
A. DNS poisoning manipulates DNS cache entries but is not directly related to user input validation.
B. MITM attacks intercept network communications but do not require input validation flaws.
C. DoS attacks overwhelm a system with excessive traffic but are not caused by improper input validation.
A security analyst is responsible for identifying and mitigating vulnerabilities in a critical business application throughout its entire lifecycle. Which technique should they implement?
A) Sandboxing
B) Continuous monitoring
C) Penetration testing
D) Input allow listing
Answer: B) Continuous monitoring
✔ Correct Explanation: Continuous monitoring tracks application behavior, vulnerabilities, and potential security flaws from development through end-of-life, ensuring long-term security.
✘ Incorrect Answers:
A) Sandboxing – This isolates applications for testing but does not continuously track vulnerabilities over time.
C) Penetration testing – This assesses security at a single point in time, rather than continuously monitoring for issues.
D) Input allow listing – This prevents malicious inputs but does not provide ongoing monitoring of security risks.
A security analyst is tasked with tracking and maintaining accountability for all IT assets. Which process ensures that each asset is properly assigned and secured?
A) Ownership assignment
B) Asset classification
C) Assignment and accounting
D) Inventory management
Answer: C) Assignment and accounting
✔ Correct Explanation: Assignment identifies security classification, while accounting ensures responsibility for securing assets, making them critical for asset tracking.
✘ Incorrect Answers:
A) Ownership assignment – Determines who is responsible for the asset but does not track security classification.
B) Asset classification – Defines sensitivity levels but does not include ownership and responsibility.
D) Inventory management – Involves tracking assets, but does not assign security responsibility.
An organization is replacing its old hard drives and needs to ensure that no sensitive data can be recovered after disposal. Which of the following methods provides the MOST effective security?
A) Cryptographic erasure followed by physical destruction
B) Formatting the hard drives using a disk management tool
C) Deleting all files from the operating system and emptying the recycle bin
D) Storing the hard drives in a secure location indefinitely
Answer: A) Cryptographic erasure followed by physical destruction
✔ Correct Explanation: Cryptographic erasure ensures that encrypted data is unrecoverable, and physical destruction (e.g., shredding or degaussing) completely eliminates any possibility of data recovery.
✘ Incorrect Answers:
B) Formatting the hard drives – Data can still be recovered even after formatting.
C) Deleting files and emptying the recycle bin – Deleted files remain on the disk and can be restored.
D) Storing drives in a secure location – This only delays disposal and does not eliminate the risk of unauthorized access.