1/296
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Serafina is studying to take the Security+ certification exam. Which of the following CIA elements ensures that only authorized parties can view protected information
Confidentiality
Which of the following is NOT a message-based attack surface
Network Protocols
Which of the following AAA elements is applied immediately after a user has logged into a computer wit their username and password
Authorization
Which of the follow controls is NOT implemented before an attack occurs
Detective control
What is another name for “attack surface”
Threat vector
Which tool is most commonly associated with nation-state actors
APT (Advanced Persistent THreat)
Complete this definition of information secutirty: That which protects the integreity, confidentiality, and availability of information _____
THrough products, people, and procedures on the devices that store, manipulate, and transmit the information
Which of the following is NOT true about supply chains
Vendors are the first step in a supply chain
Which specific type of control is inteded to mitigate damage caused by an attack?
Correcrive control
Ginerva is explaining to her roommate the relationship between security and convenience. which statement most accurately indicates this relationship
Security and convenience are inversely proportional
what is the primary motivation of hacktibists
Disruptions/chaos
Gia has been asked to enhance the secuirty awareness training workshop for new hires. Which category of secuirty control would GIa be using
Operational
Which of the following groups the lowst level of technical knowldge for carrying out cyberattacks
Unskilled sttackers
What is considered the motovation of an employee who practices shadow IT
Ethical
A large complex is being constructed on a resitrcted site. THey require a very high-speed, low maiteance classified network. What type of PDS should they install
Alarmed carrier PDS
Which of the following most accurately describes the differences or similarities between misinformation and disinformation
A false warning is an example of disinformation
Disinformation is a type of misinformation
Gemalyn enters websiteA.com in the address bar of a browers but is redirected to websiteB.copm due to an infected DNS. What type of explot did Gemalyn experience?
A redirection techniquer called Pharming
Which of the following statments best describes how a Faraday cage prevents data leackage
It is used to prevent EMI from escaping the enclosure
Company A sends a fictitous overdue invoice that appears legitmate via email to Company B, a large corporation. Company A hopes that Comapny B will comply and make the payment without ivnestigating. What type of attack is this?>
Phising
BEC
Which of the following most accurately describes the simiarlties and/or differences between spear phising and whaling
Whaling targets wealthy indidvuals and senior execurives
Spear phising used customized information to targest specific users
Lamarr receives a text message indicating the password to hi bank accoutn has been changed buy needs vrification to commit he chage. It inculdes a numer to call and a link, both of which will elad to fraud if Lamarr follows through with instructions. This is an example of what type of attack?
Smishing
Which of the following lists the data type in order from the type that needs the highest level of pretion to he lowest leve?
Confidential, private, sensitive
An individual who was recently fired goes to their former place of eomployment on a weekend. Since they are unable to enter, securityy goes to the frton door to inquire. the fired employee says they forgot their access card adn justneeds to pickup their tablet in their office
Human Vector
You are tasked with installing a system in a large wearehouse that is capable of detecing levels of daylight to dim interior lights to conserve energy. In addtion, if an intruder enters the warehouse an alarm should be triggered. The system you isntall will mostly likey support what type of signal/radio wave
Microwave
Karlo installs an alarm sysstem that is capable of emitting and dececting a signal i nthe light spectrum. The capability serves the purpose of decting motion andhow close an object is in a limted space. Which of the following best describes the type of signal the emitter can transmit
Infrared
Which of teh following most accurately describes the differences or simiarlites between typo squaitting and cybersquatting?
Cybersquatting is registering a domain that contains tradmarks and then selling it
a domain name with a onel etter change relative to an authentic site is an example of typo squatting
The CEO of a smal retail chain is visitng a client. They call hte help desk in a panic to request a password reset because it expire. The technician says they are not allowed to manually reset passwords but to kindly use the online password reset system. The CEO gets irate, says your fired and hangus up.
The technician did the right thing
What type of security buffer are you msot likey to encourter at a high security data center that inforces restricted access and requires asecurity clearance to gain entry
Access control vestibule
A group of scientists are trying to vigorously proect a mjaor discovery that will poetentially lad to a series of breakthrough products. Thety all sign a special nondisclosure agreement and commit to not reavaling the information to others outside the deparment.
Secuyrity through obscurity
Adelli sends an image file containing a secret message to her sister as an attachment. Adelli gives her sister isntructions over the phone on how to read the message. The sister fllowx hte instructions and reads the message.
Steganography Whic
h key combination would the recipein of a messsage use to confirm the integrity of the message as well as the authenticity of the sender
The sender’s pblic key and recipients private key
Which of the following statments proper expresses the characteristiscs of AES and Blowfish
AES is capable of usign 256 bit key
AES and blowfish use prvate key cryptography
Blow fish operates on 64-bit blocks
A company is exploring a verity of symmetric key algorithms to use in an app.
The key must be kept private
An attacker is scanning wireless netowkrs and sicovers that one of them is set up to support the two most recent protocols. What type of attack is the malicoous actor most likey to launch to try to breach the security settings of the wireless deviec
Downgrade attack
You need to explain to the CEO of a company the differences between symeetric and asymmetric cryptographic algorithms. Which of the following statments are you most likey to convey
ECC is among the better asymmetric cryptographic algorithms.hjo
johnny devlops an app to ecnrpyt short messages. He runs the encrpytion progam, but is designed to deliberatlyey introduce a 5- to 15 second delay before ecnrption begins.
Plaintext
Cadence will attempt to find two different sets of iunput ext that will yeild the same hash when using MD5
Collision attack
Barrabi mined Bitcoin uears ago that is now worth millions of dollars. He encrypted the password but cant remember the key he used to encrypt it. Upon employing the services of barnum, a skilled security professional, he was eventually able to determine the key.
He preformed a cyphertext attack
Alpha and Beta are having a conversation in English Gamma, who is gifted conversationlsit and tends to monopolize conversations, aproaches Alpha and Beta. As soon as Alpha an d BEta see Gama, they start sp[eaking in Spanish but Gmma does not understand.
They employed a form of encryption.Whic
Which of the following statements best describes the critical factor that allows cryptographic algorithms to be effective
The keys used by algorithms must be securely guarded
Ipsec is considered a transparent protocol. Which of the following statments best describes what this means
Programs do no need to be modified to run under IPSec
Users do not need to be trained on specific security procedures
Part of your responsibilities include maintining the root CA as well as intermediate CAs for a large organization
Keep it powered down unti lyou need to issue or reissue certificates
Kuruvilla is looking for a new online game to play. During this exploration the browser gives an indication that there was a network error
OCSP was not able to access the server it was trying to contact.
You want to open an account with an online bank that is paying fiver percent itnerst because othe rbanks are not only paying two percent. You opened a browser and go to bankofutopi but get a little suspicous
Check the digitl certifiate
which of the following is a characteristic that helps determine the strength of a key
Randomness
Cryptoperiod
Key space
A key was revoked before it expired. Xan takes the revoked key out of the revocatio nstate and reactivates it to extract and decrypt old messages from an emai lacrhival systesm.
A revoked key cannot be reinstated
Three entites know and trust eachother completely. In a public key infastrucutre setting, which of the following could b sued to describe htis type of trust
Direct Trust
Web of trust
An employee eas expected to return to work after a three month leave due to personal issues. However, because of additional issues, the leave has been extendedby nin months. What is the possibel action the company could take regarding the employee’s digitalk certificate
Revoke it
Suspend it
Which of the following represents and inprovment made to the current version of TLS outlined in this module
Uses perfect Forward Secrecy for public key-based key exchange
Encrypts handshake messages after the SeverHello exchange
Which of the following statments is true relative to the concept of certifate chaining
The endpoint of a chain is user digital certificate
Root digital certificates are self signed.
Hitee is asked to provide a local entity from which the status of digital certifiates can be viewd.
CR
A security compliance specalist, you are asked to produce CP and CPS documents
A CPS is more technical document than CP
A CP is a set of rules that govern the operation of PKI
Company Beta does some testing on highly anticipated software application and soon installs it in a production enviroment. Problems ensue so they contact Company Alpha, the company who release the software. While investigating the problem, Company Alplha discovers a buffer overflow vulernability. What could have casued it?
Poor coding practices
Jennifer’s computer is infected due to phising scam. Sbased onthe message presented, she is willing to pay in bitcoin to regain access to her compute because she does not want to lose her video productions. Howver, she is having difficult time lauching a broswer to pay the ransom. What type of malware was most likey installed
Blocking ransomware
Pamela installed a program that scanned the interet for coupons. A week later her bank acount was hacked. How was Pamela’s bank account most likey compromised
She installed a computer Trojan
You are serving as a contractor at a company to help harden endpoints. Which of the following could you implement to help achieve the goal
Use a patch management system
Use an application allow listA
A software quality assurance associate is testing two modules in an application on a web server. One module generates fata adn the other reads data. However, whenever data is being generated, as oon as the module that reads data is initiated, the applicatin crashes. Which of the following is most likey to be causing te problem .
Dereferncing a pointer with a NULL value
A company’s network is infected with ransomware. They are told data has been stolen. In addtion, they are told to pay a ransom to decrpy the data on their servers, or the stolen data will be realsed to he public. Which of the following would bethe best option for the company?
There is not best option
What means of protection can be used to help ensure a browsing experience is not susecptible to unauthorized interception of certain elements of the transmission
Use HTTPS
USe secure cookies
Jeffeson downloads a version of PowerShell that is purported to have capabilities that exceed those of the native version. Shortly thereafter his computer starts to exhibit unusual behavior. The installed anti-malware tool does not reavel any
Company Beta does some testing on highly anticipated software application and soon installs it in a productive environment. Problems ensure so they contact Company Alpha, the company who released the software. While investigating the problem, Company Alpha discovers a buffer overflow vulnerability. What could hva caused the vulnerability
Poor coding practices
Jennifer’s computer is infected due to a phisihing scam. Based on the message presented she is willing to pay in Bitcoin to regain acess to her computer because she does not want to lose her video productions. However she is having a difccult time launching a broswer to pay the ransom. What is most likey installed
Blocking ransomware
Pamela installed a progam that scanned the internet for coupons. A week later her bank was hacked. How was pamela’s bank account most likey compromised
She installed a trojan
You are serving as a contractor at a company to help hadren endpoints. which of the following could you implement to help achieve the goal
US a ptach management system
USe an application allow lsit
A software quailty assurance associate is testing two modules in an pplication ona webserver. One module generates data and the oher reads data. However, when data is being generated, as soon as the module that reads data is initiated, the application crashes. Which of teh wfollow is the mostl likey to be causing the problem
Differencing a pointer with a NULL value
A compan’ys network is infected with ransomware. They are told that data has been stolen. In addtion, they are told to pay ransom to decrpy the data on their servers, or the stolen data will be released to the public. Which of the following would be the best option for the company
There is no best option
What means of protection can be used to help ensure a browsing experience is not susceptible to unauthorized interception of certain elements of he transmission.
Use HTTPS
Use secure cookies
Jefferson downloads a version of PowerShell that is purported to have capabilities that exceed those of the native version. Shortly therafter his computer starts to exhibit unusual behavior. the installed ani-malware tool does not reveal anything he does not already know. What type of malware is most likey to be installed on the sysstem
Fileless virus
A malicous actor manages to install a backdoor on a system. What are some of the most likey reasons why they would do this?
For privilege escalation purposes
To circumvent security protections
Florentina is analyzing a network and notices an unusual amount of traffic is being generated by some computer. Additional investigation reveals that most of te traffic is in the form of images being transmitted to an unfamiliar site. What specific type of malware was most likely installed on the compromised systems.
Software keylogger
A ecuirty company is testing an unpactched server running an older OS connected to the internet in an isolated network. However, the antimalware software installed on the server was consistently not able to dectect a particular type of infections. What type of infection was least likey to be dected by the anti-malware app
Rookit
A user sees a message in their broswer that appears to be from the compay whose OS is installed on their computer. IT idplayes a number to call support to fix the problem. When the user calls, the threat actos requirests per mission to install software to scan the system but instead installs a threat agent for late access. WHat ype of malware did the attacker most lieky install.
RAT
Excel is watching a game with friends in a public forum. He is an avid fan and enjoys debating how his favorite player happens to be the best player in the league. Shortly after the game he receives a message on his mobile device with a link purporting to be advertising T-shirts and other merchandise with his favorite player. What may have caused this to happen?
Malware on his phone was engaged in unauthorized recording or listening.
Why has there been a heightened interest by threat actors toward attacking mobile devices?
They have access to sensitive data.
A company uses the COPE enterprise deployment model. Every six months they delete outdated sales data from the mobile devices. However, sometimes users submit a help desk ticket to restore personal data that was accidentally deleted. How could this problem be prevented?
Use containerization.
For security reasons, an app has the restriction that it can only be used within a one-kilometer radius of a secure facility. What is being used to enforce this restriction?
Geofencing
Which of the following statements represents steps that can be taken to harden SCADA systems? Select two.
Disconnect unnecessary connections to the SCADA network.
Identify all connections to SCADA networks.
A parent, who is a small business owner, takes their child on a business trip. The child uses the parent's phone during the flight. Unfortunately, the child leaves the phone on the plane, but the parent realizes it after it is too late to retrieve it. What kind of security could have prevented this type of vulnerability?
Physical security
A small company decides to adopt the COPE enterprise deployment model and supplies Android devices to its employees. Due to a significant downturn in the economy, they have not upgraded the devices in five years. What should the company do to limit the risk relative to the mobile devices?
Replace the devices with newer models.
You work at a very large water treatment facility. Which of the following best describes systems you should secure and harden to help minimize any potential downtime? Select two.
ICS systems
SCADA systems
An individual places a new USB cable near one of the charging stations at a busy airport. They wait from a nearby distance hoping someone will use the cable. What is the intent of the individual?
To send malicious commands to the device.
A commuter sees a flyer on a train with a QR code advertising high interest rates at an online bank. The commuter scans the code, but the website indicates the promotion has ended. Within a few days the commuter's phone starts sending messages to everyone in the contacts with a malicious link. How could this have been prevented?
Do not scan QR codes from unfamiliar sources.
Guang buys a mobile device at an Apple store. He wants to harden the device using two strong methods of authentication. Which of the following would you advise Guang to use? Select two.
Facial recognition
Password
At a software development company, team Alpha is responsible for static code analysis while team Beta is responsible for dynamic code analysis. Which of the following statements accurately describes the differences or similarities relative to how the teams conduct their analysis? Select two.
Dynamic code analysis is performed while the code is running.
Static code analysis may include actively examining each line of code visually.
Which of the following are features typically available when enabling loss or theft services on a mobile device? Select two.
Ability to remotely erase sensitive data stored on the device.
Ability to remotely lock the device.
Jailbreaking an Apple iOS device or rooting on Android devices opens opportunities that allow the user to download and install apps from a larger pool of available sources. What are the risks, if any, associated with this type of activity?
Downloaded apps may contain malware that bypass the phone's security.
Anita is visiting a client when she discovers an app that was internally developed is missing from her mobile device. She contacts the home office, and they install the app remotely. What tool most likely provided this capability?
MAMA
As part of your software test engineering role at a corporation, you need to set up a system that generates random input to trigger events such as exceptions, memory corruption, and other security breaches. Which of the following will you deploy? Select two.
Dynamic code analysis
Fuzzing process
Which of the following statements best describe why it is beneficial to use a RTOS in a SoC?
A RTOS can handle very large amounts of data very quickly.
An elderly person withdraws money from an ATM at a bus terminal. They are speaking on their cell phone and overlook retrieving the bank card from the card reader. A malicious actor is watching and steals the card. Unfortunately, the card has a small piece of tape with the PIN. The attacker waits a couple of hours after the elderly person has boarded a bus and goes to the ATM to withdraw money. Even though the elderly person has not yet realized their card is missing, the attacker is unsuccessful. Which of the following most likely thwarted the attacker's intent?
Geolocation
A senior software engineer starts working at a small company that wants to incorporate secure coding practices. Quality assurance currently begins after the application has been tested but before production. The engineer sees an opportunity and recommends adopting a method that breaks down the project into smaller biweekly development "bursts" that include testing. Which of the following statements are true? Select two.
The company is currently using the waterfall model.
The engineer prefers using the agile model.
Which statement best describes why devices and systems that are optimized to draw very low levels of power lack the ability to perform strong security measures?
To preserve battery life.
Which of the following best describes characteristics of embedded systems? Select two.
They are designed for a specific function.
They are contained within a larger system.
Navana is responsible for implementing a cognitive biometric system to authenticate users at her company. Which one of the following elements will employees need to possess to log in successfully?
Something you are
Alexandria works at a secure installation that requires a special ID card with her picture to gain access. An officer at the gate needs to scan the ID card before allowing employees to enter the installation. One day she forgets her card. However, since the officer recognizes her, the officer lets her pass through the gate. Which of the following elements, if any, did the officer violate (not enforce)?
Something you have
A security audit firm recommends using a technology that will help protect password digests at a corporation. Their recommendation will dramatically reduce the efficiency of password cracking endeavors should the password digest ever be stolen. Which of the following reflects what the security audit firm may have recommended? Select two.
Argon2
Key stretching
Pooma is researching the viability of implementing keystroke dynamics to authenticate users. She writes a report highlighting some of the benefits. Which of the following statements is she most likely to include in the report as well as consider in the implementation plan? Select two.
It requires no specialized hardware.
No additional steps are required beyond entering the username and password.
A mid-sized company requires users to log in using an OTP sent to their smartphone in an SMS text. However, their plan is to replace the current system of authentication and provide everyone with a security key. What would motivate the company to take this action?
Because security keys do not generate OTPs.
The letter I in IAM deals with which of the following items? Select two.
Identity proofing
Authentication
Conrad stores multiple passwords in a user vault file that is protected by one strong password. Features include enhanced encryption and requiring a secret key file to be present when entering the master password to open the vault. Which of the following is Conrad using?
Password manager