A.2.1 Security+ SY0-701 Domain 1: General Security Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

Which of the following are often identified as the three main goals of security? (Select three.)

- Confidentiality

- Integrity

- Availability

2
New cards

You are a security manager for a mid-sized company and are considering using a third-party certificate authority (CA) to manage your company's certificates.

Which of the following would be the MOST significant benefit of using a third-party CA?

It would allow your company to set up different certificate policies through intermediate CAs.

3
New cards

Which of the following encryption mechanisms offers the least security because of weak keys?

DES

4
New cards

The success of asymmetric encryption is MOST dependent upon which of the following?

The secrecy of the key.

5
New cards

Which of the following BEST describes compensating controls?

Partial control solution that is implemented when a control cannot fully meet a requirement.

6
New cards

There are several block cipher modes of operation that can be utilized depending on the application or use.

Which of the following block cipher modes of operation uses a nonce combined with a counter that is encrypted?

Counter Mode (CTR)

7
New cards

What is a nonce?

A random string that is used for all blocks during the encryption process.

8
New cards

After encountering a cyber attack, an organization uses a monitoring solution that automatically restarts services after it has detected the system has crashed.

What type of functional security control is the company implementing?

Corrective

9
New cards

Which of the following is the weakest symmetric encryption method?

DES

10
New cards

Which of the following BEST describes the domain controller component of Active Directory?

A domain controller is a server that holds a copy of the Active Directory database that can be written to and is responsible for copying changes to Active Directory between the domain controllers.

11
New cards

What is an Active Directory (AD)?

is a database and set of services that connect users with the network resources they need to get their work done.

12
New cards

A newly launched online store wants to secure transactions between the store and customers. The store must guarantee the authenticity of transactions, provide confidentiality, and ensure that only authorized recipients can access the purchase details.

Which cryptographic technique would best meet these requirements?

Asymmetric encryption

13
New cards

As a network administrator, you are asked to recommend a secure method for transferring data between hosts on a network.

Which of the following protocols would you recommend? (Select two.)

- Secure File Transfer Protocol (SFTP)

- Secure Copy Protocol (SCP)

14
New cards

Which of the following statements accurately describes the root of trust model in a public key infrastructure (PKI)?

The root of trust model defines how users and different CAs can trust one another, with each CA (Certificate Authority) issuing itself a root certificate.

15
New cards

As part of enhancing its data protection strategy, a corporation's IT manager aims to ensure defense-in-depth by integrating a technical control alongside existing managerial and operational controls.

Which measure BEST exemplifies a technical security control according to the classification scheme?

Setting up a network intrusion detection system.

16
New cards

You want to protect data on hard drives for users with laptops. You want the drive to be encrypted, and you want to prevent the laptops from booting unless a special USB drive is inserted. In addition, the system should not boot if a change is detected in any of the boot files.

What should you do?

Implement BitLocker with a TPM.

17
New cards

What is BitLocker?

A Windows security feature that protects your data by encrypting your drives.

18
New cards

What is a Trusted Platform Module (TPM)?

A dedicated chip on a computer's motherboard that securely stores cryptographic keys and other security-related data.

19
New cards

A company transmits data across a network, ensuring the non-repudiation security principle.

What is the key benefit this provides to both the sender and the recipient of the data?

Neither party can deny the authenticity of the data.

20
New cards

What is a non-repudiation security principle?

A a security principle that ensures data originated from a verified sender and reached the intended recipient. This process means neither party can deny the authenticity of the data.

21
New cards

Hashing is the process of converting one value into another using a mathematical algorithm like MD5 or SHA. This fixed length of data is called the hash.

Which of the following are true statements about hashing? (Select two.)

- A hash cannot be decrypted

- Hashing is used on data that does not need to be decrypted, such as a password.

22
New cards

When two different messages produce the same hash value, what has occurred?

Collision

23
New cards

A network administrator responsible for managing the encryption keys used in the organization's secure communications had a new key management policy implemented by the organization, which included a provision for key escrow.

The administrator understands the role of key escrows in relation to private keys.

Which of the following BEST describes the purpose of key escrow in the context of private keys?

Key escrow involves securely storing a copy of the private key with a trusted third party for recovery purposes, ensuring availability in case of key loss or compromise.

24
New cards

Which of the following is a limitation of using a DNS sinkhole as a cybersecurity measure?

DNS sinkholes are ineffective if the malware uses a public DNS server or its own DNS server.

25
New cards

An organization frequently implements changes, reconfigurations, and patches to enhance its IT infrastructure's security and efficiency. The cybersecurity analyst must carefully analyze dependencies between services, applications, and interfaces to avoid unintended outages and disruptions during service restarts or downtime events.

How does understanding dependencies impact the change management process? (Select the three best options.)

- Supports the development of post-change performance monitoring to validate system functionality and quickly detect issues.

- Helps avoid unintended outages and disruptions during service restarts or downtime events.

- Guides the development of effective backout plans and downtime contingencies.

26
New cards

Which of the following is no longer valid for security purposes?

MD5

27
New cards

Which of the following are key benefits of using smart cards? (Select two.)

- They provide tamper-resistant storage for a user's private key and other personally identifying information (PII).

- They isolate security-related operations from the rest of the system.

28
New cards

The information technology department in a large organization is implementing a new system where the system allows, determines, and enforces various resources based on predefined company guidelines.

Which concept is the department implementing?

Policy-driven access control

29
New cards

You are a cybersecurity manager at a financial institution. Your team is responsible for managing the cryptographic keys used for secure transactions.

Recently, there has been an increase in attempted cyber attacks on your institution.

Which of the following key management strategies would be MOST effective in maintaining the security of your cryptographic keys under these circumstances?

You decide to set an expiration date for all current keys and inform users that they will need to renew their keys after this date.

30
New cards

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it.

Which key would Mary use to create the digital signature?

Her private key

31
New cards

The cybersecurity team at a multinational corporation is collaborating with the facilities department to design a new data center. The team seeks to integrate top-tier physical security controls into the site layout to maximize protection against potential threats.

The discussions revolve around the BEST strategies to ensure the safety of the data center.

When designing the physical security controls for the site layout of the new data center, which strategy would be MOST effective in deterring unauthorized access and providing a comprehensive security layer?

Establishing a security perimeter with layered access controls

32
New cards

A recently breached company tasks the cyber team to further restrict end-user permissions.

What describes the use of an application allow list?

It enforces policies in computer systems and networks.

33
New cards

After an unauthorized access incident in the server room over the weekend, the IT department of a company decides to implement new security controls to deter similar future incidents.

Which of the following should they implement?

Placing visible signs indicating surveillance and severe penalties for unauthorized entry.

34
New cards

John, a security analyst, is using a smart card to gain access to a secure server room. He simply waves his card near the card reader and the door unlocks.

Later, he uses the same card to log into his computer by inserting it into a card reader.

Based on this information, is John using a contact or contactless smart card?

Both a contact and contactless smart card, because he used the card both by inserting it into a reader and by waving it near a reader.

35
New cards

A software patch was inadvertently pushed out early, during the middle of the workday, and has brought business to a halt. The chief executive officer (CEO) demands that the systems return to full operations immediately.

What part of the change plan will assist in this task?

Backout plan

36
New cards

Which of the following terms means a cryptography mechanism that hides secret communications within various forms of data?

Steganography

37
New cards

SSL (Secure Sockets Layer) operates at which layer of the OSI model?

Session

38
New cards

Due to the introduction of security vulnerabilities during a previous change, company leadership wants reassurance that the vulnerabilities will not happen again.

The IT department has made several changes to its change management plan.

What are items the IT department would add to this plan? (Select three.)

- Test results

- Impact analysis

- Backout plans

39
New cards

The security operations manager of a multinational corporation focuses on enhancing directive operational controls.

Which of the following should the manager implement?

User awareness and training programs.

40
New cards

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender.

Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Sender's public key

41
New cards

What is the purpose of identity and access management (IAM) automation in the onboarding process for new employees in an organization?

To automate the provisioning and access management tasks associated with new employees.

42
New cards

Which of the following are true concerning the one-time pad (OTP) concept on which a streaming cipher is based? (Select two.)

- OTP demonstrates what is called perfect secrecy.

- OTP uses a symmetric encryption key that is the same length as the data being encrypted.

43
New cards

Which of the following types of encryption is specifically designed to allow data to be worked on without decrypting it first?

Homomorphic encryption