Sec+ Messer Practice Exams (Ones I got wrong)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

DKIM vs DMARC

DKIM (DomainKeys Identified Mail) verifies email integrity and authenticity by using digital signatures.

DMARC (Domain-based Message Authentication, Reporting & Conformance) provides instructions to receiving email servers on how to handle unauthenticated messages (authorized devices list also)

2
New cards

Security Content Automation Protocol

3
New cards

RTOS

Real time operating system - an operating system (OS) for real-time computing applications that processes data and events that have critically defined time constraints

4
New cards

What is regulated data?

information that is protected by local, national, or international statute or regulation mandating certain restrictions

5
New cards

On path attack?

cyberattack where an attacker intercepts and possibly alters communication between two parties who believe they are communicating directly with each other

6
New cards

What is federation?

process that allows users to authenticate to multiple systems using a single set of credentials, often across different organizations

7
New cards

What is MOA?

non-binding document that outlines the terms of a collaborative relationship between parties. It's a more formal agreement than a verbal understanding but less binding than a formal contract

8
New cards

Deterrent in regard to security control?

attempt to prevent incidents by discouraging individuals from causing security incidents

9
New cards

What is a record encryption?

helps organizations maintain compliance with data security standards with an additional layer of protection for sensitive data

10
New cards

What is journaling?

he practice of logging and recording information for various purposes, such as auditing, compliance, or data recovery

11
New cards

What is discretionary access control?

type of access control where the owner of a resource (like a file or directory) decides who can access it and what they can do with it

12
New cards

Mandatory Access Control (MAC)

enforces access based on centrally defined policies and user clearance levels

13
New cards

What is a responsibility matrix?

who is accountable for specific cybersecurity tasks and responsibilities within an organization. It clarifies roles and responsibilities, ensuring accountability and efficient resource allocation, especially during incidents.

14
New cards

What is SASE?

a cloud-delivered cybersecurity framework that integrates networking and security functions into a single, unified platform

15
New cards

Containerization

a lightweight virtualization method that packages applications and their dependencies into self-contained units called containers, which run on a shared host operating system

16
New cards

What is OSINT?

Open source intelligence (gather info about company from outside sources, like social media)

17
New cards

What is tokenization?

the process of replacing sensitive data with non-sensitive, unique placeholders called tokens

18
New cards

What is a WAF?

Web Application Firewall - cybersecurity solution designed to protect web applications from a variety of cyber threats and attacks

19
New cards

What is a replay attack?

A replay attack in cybersecurity is an attack where an attacker intercepts legitimate data transmission, typically an authenticated message, and then retransmits it to trick the recipient into performing an unauthorized action or gaining access

20
New cards

What is secure enclave?

a hardware-based, isolated environment within a CPU that's designed to protect sensitive data and cryptographic keys. It's like a secure "black box" that isolates critical operations, preventing unauthorized access to protected data even if the main operating system is compromised

21
New cards

What is a data subject?

data subject is an individual whose personal data is being processed, meaning it is being collected, used, or stored by an organization

22
New cards

What is detective in terms of security control?

security controls that are designed to detect, log, and alert after an event has occurred

23
New cards

AAA have a big focus on centralizing authentication.

24
New cards

What is OCSP stapling?

a technique that enhances the efficiency and security of SSL/TLS connections by streamlining the certificate validation process

25
New cards

Whats a wildcard in cybersecurity?

a wildcard SSL/TLS certificate, which allows you to secure multiple subdomains under a single certificate

26
New cards

What is CSR creation?

creating a Certificate Signing Request (CSR), a digital file used to request a digital certificate from a trusted Certificate Authority (CA). This CSR contains information about the entity requesting the certificate

27
New cards

What is exposure factor?

the percentage of an asset's value that would be lost if a specific threat or vulnerability were to be exploited. It's a key component in calculating potential losses and prioritizing security efforts

28
New cards

What is conflict of interest?

when an individual's personal interests or obligations potentially conflict with their professional duties, potentially compromising the organization's security

29
New cards

What is chain of custody?

a meticulously documented record of who handled, when, and why digital evidence was accessed, modified, or transferred from its point of collection to its final destination

30
New cards

What is E-discovery?

e-discovery refers to the process of identifying, preserving, collecting, and producing electronically stored information (ESI) for legal purposes, such as in investigations or as evidence in lawsuits

31
New cards

What is a legal hold?

a legal hold is a formal notice that organizations send to employees (custodians) when litigation or a potential legal dispute arises. It instructs them to preserve all potentially relevant information, including physical documents and electronically stored information (ESI), for a period of time

32
New cards

What is an air gap?

an air gap refers to the physical or logical separation of a computer or network from other systems, particularly the internet or other networks. This isolation is a security measure intended to protect sensitive data and systems from cyber threats like malware and ransomware

33
New cards

What is a fail-open?

a system's behavior where, in the event of a failure or malfunction, it reverts to an open state, allowing unrestricted access or functionality

34
New cards

What is mandatory access control?

an access control model where the system, not the individual user, dictates who can access a resource based on predefined security policies. It's a nondiscretionary access control, meaning the user can't override the system's restrictions.

35
New cards

What is ARO?

Annual Rate of Occurrence. It represents the estimated frequency with which a particular risk or threat is expected to occur within a given year.

36
New cards

What does XDR stand for?

XDR stands for Extended Detection and Response. It's a technology that collects and analyzes security data from multiple sources (like endpoints, networks, and cloud) to improve threat detection, investigation, and response.

37
New cards

What does HA stand for?

High Availability - ensuring continuous operation of critical security systems, even during failures or outages, by implementing redundant systems and failover mechanisms

38
New cards

What does ALE stand for?

Annual Lost Expectancy - metric used to estimate the potential financial loss an organization might experience from a specific security risk over a one-year period

39
New cards

What does SLE stand for?

Single Loss Expectancy - represents the monetary value of a single loss that can occur if a specific asset is compromised or vulnerable

40
New cards

What does EDR stand for?

Endpoint Detection and Response - A technology that continuously monitors endpoints (devices like laptops, desktops, and mobile devices) to detect and respond to cyber threats.

41
New cards

What does CRL stand for?

certificate revocation list (CRL) - a list of digital certificates that have been revoked by the issuing certificate authority (CA) before their actual or assigned expiration date

42
New cards

Admin vs Owner vs Group vs System — Rights/Permissions Control

Pic attached

<p>Pic attached</p>
43
New cards

SSO vs Federation

single organization vs multiple

44
New cards

Active Reconnaissance

where an attacker or tester actively engages with a target system to gather information

45
New cards

What is an injection?

The unwanted injection of data into a database, library, or any other data flow

46
New cards

Forgery Attack

cross-site request forgery commonly uses malicious links to take advantage of the trust a site might have for a user's browser. Packet captures are not necessary to perform a forgery attack.

47
New cards

SD-WAN

SD-WAN network allows users to efficiently communicate directly to cloud-based applications

48
New cards

What is Non-repudiation?

the assurance that someone cannot deny the validity of their actions or communications.

49
New cards

User Changes to system: Risky vs. Unexpected, vs Unintentional

image attached

<p>image attached</p>
50
New cards

Shared Session Key ~ Asymmetric Encryption

The Diffie-Hellman algorithm can combine public and private keys to derive the same session key. This allows two devices to create and use this shared session key without sending the key across the network.

51
New cards

What is a dependency?

Modifying one part of a system may first require changes to other components. In this example, the application upgrade is dependent on an updated version of a device driver.

52
New cards

802.1x info

When 802.1X is enabled, devices connecting to the network do not
gain access until they provide the correct authentication credentials.
This 802.1X standard refers to the client as the supplicant, the switch
is commonly configured as the authenticator, and the back-end authentication server is often a centralized user database.

53
New cards

Security Content Automation Protocol (SCAP)

standardize how security software identifies, assesses, and reports vulnerabilities and configurations in computer systems

54
New cards

OSINT meaning?

Open Source Intelligence - It refers to the process of collecting and analyzing publicly available information to gather intelligence

55
New cards

Cross-site scripting

allows an attacker to inject malicious scripts into websites viewed by other users. These scripts run in the victim's browser, often without their knowledge…leading to stealing data

56
New cards

Domain Hijacking

gains control over a domain name, effectively stealing ownership from the legitimate domain holder

57
New cards

Note: An on-path attack is often associated with a third-party who is actively intercepting network traffic. This entity in the middle would not be able to provide a valid SSL certificate for a third-party website, and this error would appear in the browser as a warning.

58
New cards

Note: Federation would allow members of one organization to authenticate using the credentials of another organization.

59
New cards

Note: An MOA (Memorandum of Agreement) is a formal document where both sides agree to a broad set of goals and objectives associated with the partnership.

—-

60
New cards

Note: Integrity refers to the trustworthiness of data. A digital signature allows the recipient to confirm that none of the data has been changed since the digital signature was created.

61
New cards

Note: A race condition occurs when two processes occur at similar times, and usually with unexpected results. The file system problem can often be fixed before a reboot, but the reboot is occurring before the fix can be applied. This has created a race condition that results in constant reboots.

62
New cards

Platform Diversity

Using different operating systems and platforms can help mitigate issues associated with a single OS, but it wouldn't provide any mitigation if the primary Internet connection was no longer available.

63
New cards

Journaling writes data to a temporary journal before writing the information to the database. If power is lost, the system can recover the last transaction from the journal when power is restored.

64
New cards

Compensating controls
Compensating controls are used to mitigate a vulnerability when an optimal security response may not be available. For example, if a company can't deploy a patch for a vulnerability, they can revoke or limit application access until a patch is provided.

65
New cards

Guard rails:
Guard rails are used by application developers to provide a set of automated validations to user input and behavior.

66
New cards

A posture assessment evaluates the configuration of a system to ensure all configurations and applications are up to date and secure as possible. If a configuration does not meet these standards, the user is commonly provided with options for resolving the issue before proceeding.

67
New cards

Discretionary vs Mandatory access control

Discretionary
Discretionary access control is used in many operating systems, and this model allows the owner of the resource to control who has access.

Mandatory
Mandatory access control allows access based on the security level assigned to an object. Only users with the object’s assigned security level or higher may access the resource.

68
New cards

Network protection mismatches
A hybrid cloud includes more than one private or public cloud. This adds additional complexity to the overall infrastructure, and it's common to inadvertently apply different authentication options and user permissions across multiple cloud providers.

69
New cards

Risk appetite
A risk appetite is a broad description of how much risk-taking is deemed acceptable. An organization's risk appetite posture might be conservative, or they might be more expansionary and willing to take additional risks

70
New cards

Impact Analysis

process of assessing the consequences that a cyber threat, vulnerability, or security incident could have on an organization’s assets, operations, or individuals.

71
New cards

Privilege escalation
A privilege escalation attack allows a user to exceed their normal rights and permissions. In this example, user permission escalations were not required to perform this attack.

72
New cards

Misconfiguration
There are many different configuration options when installing an access point, and it's likely one of those options allowed an attacker to gain access to the internal network.

73
New cards

Note: DNS filtering uses a database of known malicious websites to resolve an incorrect or null IP address. If a user attempts to visit a known malicious site, the DNS resolution will fail and the user will not be able to visit the website.

—-

74
New cards

What is a downgrade attack?

attacker forces a system, application, or communication protocol to use an older, less secure version of a protocol or software—one that is more vulnerable to exploitation.

75
New cards

What is configuration enforcement?

ensuring that systems, applications, or devices adhere to predefined security and operational settings

76
New cards

What is sanitization?

deletes data from storage media and allows the storage device to be used in the future

77
New cards

NOTE: A SASE (Secure Access Service Edge) solution is a next-generation VPN technology designed to optimize the process of secure communication to cloud services

78
New cards

What is an advanced persistent threat (APT)?

attacker gains unauthorized access to a network and remains undetected for a long period to steal data, spy, or cause damage

79
New cards

SDN

SDN (Software-Defined Networking) separates the control plane of devices from the data plane. This allows for more automation and dynamic changes to the infrastructure.

80
New cards

DKIM

A DKIM (Domain Keys Identified Mail) record is a DNS (Domain Name System) entry that includes the public key associated with an email server's digital signatures. A legitimate email server will digitally sign all outgoing emails and provide the public key in their DNS for third-party validation.

81
New cards

Due Care

taking all reasonable, responsible, and industry-accepted precautions to protect an organization’s information systems, data, and users from threats. It's about acting prudently and proactively to prevent harm—and being able to prove it.

82
New cards

Exposure Factor

It represents the percentage of asset value loss that would occur if a specific threat or event were to happen.

83
New cards

Data Exfiltration

Exfiltration describes the removal or theft of data by a third-party.

84
New cards

NOTE: 802.1X is commonly used in conjunction with LDAP, RADIUS, or similar authentication services.

85
New cards
<p>Evidence related terminology and documentation pic</p>

Evidence related terminology and documentation pic

86
New cards

NOTE: The secure enclave monitors the boot process, create true random numbers, store root cryptography keys, and much more.

87
New cards
<p>Data owners, processor, etc. Pic</p>

Data owners, processor, etc. Pic

88
New cards
<p>Access Control Types (mandatory, etc..) Pic</p>

Access Control Types (mandatory, etc..) Pic

—-

89
New cards

NOTE: If rule is not made on firewall ACL’S, then its an implicit deny!!!

90
New cards

Orchestration

Orchestration describes the process of automation, and is commonly associated with large scale automation or automating processes between different systems.

91
New cards

Data hashing

Data hashing creates a unique message digest based on stored data. If the data is tampered with, a hash taken after the change will differ from the original value. This allows the forensic engineer to identify if information has been changed.

92
New cards
<p>Another access/permissions related pic</p>

Another access/permissions related pic

93
New cards

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) is a system that uses public and private key cryptography to enable secure and reliable digital communications

94
New cards

Static analysis

view code without running it (check for vulnerabilities, weaknesses, etc.)