Security+ SY0-701 Terms & Definitions: General Security Concepts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

150 Terms

1
New cards

1. Felicia wants to deploy an encryption solution that will protect files in motion as they are copied between file shares as well as at rest, and also needs it to support granular, per- user security. What type of solution should she select?

A. Partition encryption

B. File encryption

C. Full-disk encryption

D. Record-level encryption

B. File encryption

2
New cards

2. Valerie wants to use a certificate to handle multiple subdomains for her website, including the sales.example.com and support.example.com subdomains. What type of certificate should she use?

A. A self- signed certificate

B. A root of trust certificate

C. A CRL certificate

D. A wildcard certificate

D. A wildcard certificate

3
New cards

3. What information is analyzed during a gap analysis?

A. Control objectives and controls intended to meet the objectives

B. Physically separate networks and their potential connection points

C. Compensating controls and the controls they are replacing

D. Security procedures and the policies they are designed to support

A. Control objectives and controls intended to meet the objectives

4
New cards

4. Susan's team has recommended an application restart for a production, customer- facing application as part of an urgent patch due to a security update. What technical implication is the most common concern when conducting an application restart?

A. Application configuration changes caused by the restart

B. Whether the patch will properly apply

C. Lack of security controls during the restart

D. The downtime during the restart

D. The downtime during the restart

5
New cards

5. Using a tool like git is most frequently associated with what critical change

management process?

A. Having a backout plan

B. Stakeholder analysis

C. Version control

D. Standard operating procedures (SOPs)

C. Version control

6
New cards

6. Jacob is concerned that the password used for one of his organization's services is weak, and he wants to make it harder to crack by making it harder to test possible keys during a brute- force attack. What is this technique called?

A. Master keying

B. Key stretching

C. Key rotation

D. Passphrase armoring

B. Key stretching

7
New cards

7. Log monitoring is an example of what control category?

A. Technical

B. Managerial

C. Operational

D. Physical

C. Operational

8
New cards

8. Rick wants to make offline brute- force attacks against his password file very difficult for attackers. Which of the following is not a common technique to make passwords harder to crack?

A. Use of a salt

B. Use of a pepper

C. Use of a purpose- built password hashing algorithm

D. Encrypting password plain text using symmetric encryption

D. Encrypting password plain text using symmetric encryption

9
New cards

9. Diffie-Hellman and RSA are both examples of what important encryption- related solution?

A. Rekeying

B. Certificate revocation protocols

C. Key exchange algorithms

D. Key generation algorithms

C. Key exchange algorithms

10
New cards

10. Sally wants to ensure that her change management process includes a procedure for what to do if the change fails. What should she create to handle this possibility?

A. An impact analysis

B. A backout plan

C. A regression test

D. A maintenance window

B. A backout plan

11
New cards

11. Theresa is concerned that her scheduled maintenance window may extend beyond the allocated time due to an unexpected issue. What element from the CIA triad is she concerned about?

A. Criticality

B. Accessibility

C. Integrity

D. Availability

D. Availability

12
New cards

12. Alaina is concerned about vehicles that might impact her organization's backup generator. What should she install to prevent both inadvertent and purposeful vehicle impacts on a generator installed outside her building near a parking lot?

A. A speed bump

B. An access control vestibule

C. Bollards

D. A chain- link fence

C. Bollards

13
New cards

13. Ben has deployed a data loss prevention (DLP) tool that inspects data and flags specific data types for review before emails containing it are sent outside the organization. What control type best describes this type of solution?

A. Managerial

B. Detective

C. Corrective

D. Preventive

D. Preventive

14
New cards

14. What type of control is a policy or procedure?

A. Directive

B. Corrective

C. Detective

D. Preventive

A. Directive

15
New cards

15. Murali has deployed a file integrity monitoring tool and has configured alerts to notify him if files are modified. What control type best describes this solution?

A. Preventive

B. Deterrent

C. Directive

D. Detective

D. Detective

16
New cards

16. Charles wants to reduce the threat scope of compromised credentials. What type of the following security controls is best suited to meeting this need?

A. Single sign-on

B. Federation

C. Zero trust

D. Multifactor authentication (MFA)

C. Zero trust

17
New cards

17. Carol wants to obfuscate data that is contained in her database. She wants to be able to refer to the data elements without having the actual data exposed. What type of obfuscation option should she select?

A. Tokenization

B. Encryption

C. Data masking

D. Data randomization

A. Tokenization

18
New cards

18. What key is used to decrypt information sent by another individual between two people using public key encryption?

A. The recipient's private key

B. The recipient's public key

C. The sender's private key

D. The sender's public key

A. The recipient's private key

19
New cards

19. Selah's organization has recently experienced a breach and the private keys for her organization's certificates were exposed. What should she immediately do?

A. Reissue the certificates with changed hostnames and other details.

B. Replace the certificates with self- signed certificates until they can be replaced by the vendor.

C. Revoke the certificates and place them on a certificate revocation list.

D. Replace the certificates with wildcard certificates.

C. Revoke the certificates and place them on a certificate revocation list.

20
New cards

20. Which of the following is not a major concern related to downtime caused by patching and system updates?

A. Attackers compromising the system or service while it is offline

B. Security systems or functions being offline during restart or shutdown processes

C. Unexpected extended downtime

D. Dependencies between systems or services related to downtime

A. Attackers compromising the system or service while it is offline

21
New cards

21. Joanna wants to ensure that the most current version of each component in her application is deployed. What change management process will help the most with this requirement?

A. Dependency mapping

B. Version control

C. Impact analysis

D. Allow and deny lists

B. Version control

22
New cards

22. Greg wants to implement a version control system to ensure that changes are made in ways that will not cause problems for his organization's critical software. Which of the following is not a common feature of version control systems designed for software source code?

A. Atomic operations

B. File locking

C. Regression testing

D. Tagging and labeling

C. Regression testing

23
New cards

23. Christina wants to implement a physical security control that has the greatest flexibility in how it is applied because she knows that exceptions to security practices may be required at times. Which of the following solutions has the greatest flexibility?

A. Video surveillance

B. Security guards

C. Access badges

D. Access control vestibules

B. Security guards

24
New cards

24. Lisa wants to ensure that theft of a device will not lead to exposure of the data contained on the device if the device is locked or turned off. What type of encryption should she select to best ensure this?

A. Volume-level encryption

B. Full- disk encryption

C. File-level encryption

D. Partition-level encryption

B. Full- disk encryption

25
New cards

25. Mahmoud has been asked to implement an allow list for websites that users at his company can visit. What concern should he bring up to management due to this request?

A. Allow lists cannot be used for websites.

B. Allow lists are overly permissive and are likely to allow unwanted sites to be visited.

C. Using an allow list for websites will take a lot of time to maintain.

D. Using an allow list for websites is easily bypassed.

C. Using an allow list for websites will take a lot of time to maintain.

26
New cards

26. Which of the following change management processes does not commonly directly involve stakeholders outside of the IT organization?

A. Impact analysis

B. Building the backout plan

C. The change approval process

D. Determining the maintenance window

B. Building the backout plan

27
New cards

27. What hardware component is used to generate, store, and manage cryptographic keys?

A. A CPU

B. A NSA

C. A TPM

D. A CCA

C. A TPM - Trusted Platform Module

28
New cards

28. Chris wants to check to see if a certificate has been revoked. What protocol can he use to validate the current status of a certificate?

A. TLS

B. OCRS

C. SSL

D. OCSP

D. OCSP - Online Certificate Status Protocol

29
New cards

29. Brian's organization uses a process where a secure module boots systems, then monitors them as each boot stage proceeds. It validates each signed boot stage and reports on whether the boot process was correct or not when complete. What is the secure module used to verify these stages called?

A. A secure initiation manager

B. A root of trust

C. A boot hash

D. A cryptographic boot manager

B. A root of trust

30
New cards

30. A vulnerability scan shows that an embedded device that Alice is responsible for has a vulnerability. She knows the vendor is no longer in business and that there is no updated firmware or software update for the device. To resolve the issue, Alice places a firewall between the device and the rest of the network and creates rules that prevent the vulnerable service from being available to other devices. What type of control has Alice deployed?

A. A directive control

B. A compensating control

C. A detective control

D. A procedural control

B. A compensating control

31
New cards

31. Jason knows that his Apple system uses a separate portion of its SoC (system on chip) to store keys and biometric information. What is this specialized component called?

A. A TPM

B. A HSM

C. A secure enclave

D. A screened subnet

C. A secure enclave

32
New cards

32. What change management term is used to describe the processes that an organization uses for each change that is made to ensure that a consistent process is used?

A. Standard operating procedures

B. A change plan

C. Fixed operating procedures

D. A backout plan

A. Standard operating procedures

33
New cards

33. Jack knows that there are three common types of database encryption. Which of the following is not a common type of database encryption?

A. Sensitivity-based encryption

B. Transparent data encryption

C. Field-level encryption

D. Column-level encryption

A. Sensitivity-based encryption

34
New cards

34. Ujamaa wants to conduct a gap analysis as part of his security efforts. Which of the following best describes what he will analyze?

A. Which services are not configured properly

B. Whether current patches are installed on all systems

C. The security program as implemented versus best practices

D. Legal requirements versus the security program

C. The security program as implemented versus best practices

35
New cards

35. Brandon wants to deploy a detective control that will help him with physical security threats. Which of the following fits his needs?

A. Fencing

B. Lighting

C. Video surveillance

D. Bollards

C. Video surveillance

36
New cards

36. Jack has deployed a system that appears to attackers to be a vulnerable system. The system is specifically designed to capture information and data from attacks to allow for later analysis. What type of tool has Jack deployed?

A. A tarpit

B. A honeypot

C. A beehive

D. An intrusion detection system

B. A honeypot

37
New cards

37. Renee wants to ensure that her logs support nonrepudiation. What should she do to ensure this?

A. Encrypt, then hash the logs.

B. Hash the logs and then digitally sign them.

C. Digitally sign the log file, then encrypt it.

D. Hash, then encrypt the logs.

B. Hash the logs and then digitally sign them.

38
New cards

38. Isaac wants to deploy sensors to detect intruders in a facility, but he is concerned about the sensors being overly sensitive. What type of sensor is best suited to detecting intruders in an open office environment without significant expense or issues with sensitivity?

A. Infrared

B. Pressure

C. Microwave

D. Ultrasonic

A. Infrared

39
New cards

39. Wayne wants to allow systems to claim identities as part of his AAA process. Which of the following is most commonly used to identify both individuals and systems?

A. Tokens

B. Smartcards

C. Certificates

D. Usernames

C. Certificates

40
New cards

40. What are considerations like database and network connectivity, authentication system access, and network time availability considered in the context of change management processes?

A. Allowed services

B. Standard operating procedures

C. Denied services

D. Dependencies

D. Dependencies

41
New cards

41. What role does the policy engine play in a zero- trust environment?

A. It creates new administrative policies based on user behavior.

B. It grants access based on policies created by administrators and based on security systems data.

C. It enforces policies by monitoring connections between clients and servers.

D. It suggests new administrative policies based on usage patterns for adoption by the organization.

B. It grants access based on policies created by administrators and based on security systems data.

42
New cards

42. Which of the following is not a common post- change activity found in change management practices?

A. Updating diagrams

B. Updating procedures

C. Updating policies

D. Updating contracts

D. Updating contracts

43
New cards

43. Which of the following activities should Alaina not restrict as part of her preparation for a change window?

A. Patching

B. Scaling clustered systems up or down

C. Changing hostnames

D. Modifying database configurations

B. Scaling clustered systems up or down

44
New cards

44. What two key features define blockchain ledgers?

A. They are immutable and nontransferable.

B. They are shared and can be modified by a vote among all participants.

C. They are unique to each participant and are atomic.

D. They are shared and immutable.

D. They are shared and immutable.

45
New cards

45. Damian issues the following command on his Linux server: openssl req - new - newkey rsa:2048 - nodes - keyout exampleserver. key - out exampleserver.csr What has he done?

A. Created a certificate signing request

B. Created a certificate revocation request

C. Signed a certificate signing request

D. Updated the OCSP record for a certificate

A. Created a certificate signing request

46
New cards

46. Nick's organization sets aside Saturday nights from 2 a.m. to 4 a.m. for scheduled maintenance. What is this type of reserved time typically called?

A. Allocated downtime

B. A maintenance window

C. An unscheduled outage

D. An allowed outage

B. A maintenance window

47
New cards

47. Megan wants to assess the impact of a change as part of her change management process. Which of the following is most likely to help her assess impact?

A. A backout plan

B. An estimate of the downtime expected

C. A list of stakeholders

D. A list of dependencies for impacted systems

B. An estimate of the downtime expected

48
New cards

48. Jared wants to estimate the downtime that will result as part of a planned change. Which of the following methods will most effectively help him estimate downtime?

A. Average the downtime from other recent changes.

B. Contact the vendor for time estimates for the change.

C. Perform the change in a test environment.

D. Use a fixed maintenance window.

C. Perform the change in a test environment.

49
New cards

49. An encryption method in which all participants have the same key is known as which of the following types of encryption?

A. Shared hashing

B. Asymmetric encryption

C. Symmetric encryption

D. Universal encryption

C. Symmetric encryption

50
New cards

50. What important encryption challenge does asymmetric encryption help with by using public keys?

A. Evil twins

B. Collision resistance

C. Key length

D. Key exchange

D. Key exchange

51
New cards

51. Rick's cloud provider offers a dedicated hardware security module. Which of the following capabilities is it unlikely to offer?

A. Validating secure boot processes

B. Key generation

C. Encrypting and decrypting data

D. Creating digital signatures

A. Validating secure boot processes

52
New cards

52. Michelle believes that an image she has discovered in an attacker's directory of files contains additional information that has been hidden in it. What is this type of obfuscation called?

A. Steganography

B. Image hashing

C. PNG warping

D. Image blocking

A. Steganography

53
New cards

Which of the following is not a common transport encryption protocol?

A. TLS

B. IPSec

C. SAML

D. SSH

C. SAML

54
New cards

54. What technology is record-level encryption most commonly associated with?

A. Stored audio files

B. Databases

C. Physical disks

D. Removable storage

B. Databases

55
New cards

55. Yasmine submits the Windows BitLocker key to a central repository after she encryptions the machine. The central repository allows files to be uploaded, but not read, and is protected with access requiring special permissions. What type of solution is Yasmine's company using?

A. A hardware security module

B. Perfect forward secrecy

C. Key escrow

D. Private keys

C. Key escrow

56
New cards

56. Valerie wants to authenticate her systems using her AAA system. Which of the following options is best suited to system authentication?

A. Asymmetric authentication

B. Certificate-based authentication

C. Symmetric authentication

D. PIN-based authentication

B. Certificate-based authentication

57
New cards

57. Valentine wants to detect if an intruder has accessed a secured file server. Which of the following techniques will work best with a data loss prevention tool to identify data exfiltration?

A. A honeypot

B. A honeynet

C. A honeyfile

D. A honeytoken

C. A honeyfile

58
New cards

58. Jason has recommended that additional lighting be put in place on the exterior of his building as part of a security upgrade. What type of control is lighting?

A. Operational

B. Deterrent

C. Corrective

D. Technical

B. Deterrent

59
New cards

59. Which of the following controls is typically the most expensive to implement?

A. Bollards

B. Access control vestibules

C. Security guards

D. Access badges

C. Security guards

60
New cards

60. Frankie wants to validate the integrity of a file by comparing it against an original copy. Which of the following solutions both fulfills this requirement and avoids known security issues?

A. Hash the original file and the current file using MD5 and compare the hashes.

B. Hash the original file and the current file using SHA-1 and compare the hashes.

C. Hash the original file and the current file using SHA-256 and compare the hashes.

D. Hash the original file and the current file using AES and compare the hashes.

C. Hash the original file and the current file using SHA-256 and compare the hashes.

61
New cards

61. Joanna's organization has a policy that requires a user's password to be immediately reset to lock accounts if the account is determined to have been successfully phished. What type of control is this?

A. A detective control

B. A directive control

C. A compensating control

D. A preventive control

B. A directive control

62
New cards

62. Jackie wants to implement an AAA system for her network. What AAA protocol is commonly used for network devices?

A. OpenID

B. SAML

C. RADIUS

D. TANGENT

C. RADIUS

63
New cards

63. Scott wants to automate policy creation in his zero- trust environment's policy engine. Which of the following is not a typical component for automated data and event- driven policy management?

A. A SIEM

B. Threat feeds

C. Infrared sensor data

D. EDR tools

C. Infrared sensor data

64
New cards

64. Valerie's organization has deployed a zero- trust solution, and Valerie receives an authentication prompt when she is attempting to access a file server. What component of the zero- trust architecture is she interacting with?

A. A policy enforcement point

B. A policy administrator

C. The policy engine

D. The trust manager

A. A policy enforcement point

65
New cards

65. Matt is assessing his organization's zero- trust model against the NIST Zero Trust Maturity Model. Which of the following is not a common element of zero- trust systems that would be assessed as part of the model?

A. Identity

B. Business model

C. Networks

D. Devices

B. Business model

66
New cards

66. Quentin wants to deploy a single sign-on system to allow his users to log in to cloud services. Which of the following technologies is he most likely to deploy?

A. OpenID

B. Kerberos

C. LDAP

D. TACACS+

A. OpenID

67
New cards

67. Marty wants to deploy a corrective control to deal with a recently compromised system. Which of the following would be considered a corrective control?

A. Patching the vulnerability that allowed the compromise to occur

B. Deploying full-disk encryption

C. Deploying an endpoint detection and response (EDR) tool

D. Enabling logging and sending logs to a SIEM

A. Patching the vulnerability that allowed the compromise to occur

68
New cards

68. What important encryption feature is not supported by symmetric encryption?

A. Confidentiality

B. Integrity

C. Nonrepudiation

D. Authentication

C. Nonrepudiation

69
New cards

69. Theresa wants to use a cloud- hosted security solution that will allow her to safely store and manage secrets. What type of solution should she select?

A. A TPM

B. A CA

C. A KMS

D. A CSR

C. A KMS

70
New cards

70. Joanna is reviewing her account information on an e- commerce website and sees her credit card number displayed as XXXX- XXXX- XXXX- 1234. What type of data obfuscation is in use?

A. Hashing

B. Data masking

C. Field encryption

D. Tokenization

B. Data masking

71
New cards

71. Amanda's organization wants to use a decentralized blockchain to store data. Which of the following is true about a decentralized blockchain?

A. No individual or group controls the blockchain.

B. Only cryptocurrency- related data can be stored in a blockchain.

C. Blockchain data can be changed after being stored by the original submitter.

D. Blockchain ledgers are stored on central servers chosen by regular elections among blockchain participants.

A. No individual or group controls the blockchain.

72
New cards

72. What role does a subordinate CA have in a CA hierarchy?

A. Subordinate CAs issue certificates based on subdomains.

B. Subordinate CAs provide control over certificate issuance while avoiding the cost of being a root CA.

C. Subordinate CAs validate root CA activities to ensure auditability.

D. Subordinate CAs review certificate signing requests before forwarding them to the root CA.

B. Subordinate CAs provide control over certificate issuance while avoiding the cost of being a root CA

73
New cards

73. Which of the following sensor types is commonly used to detect footsteps?

A. Infrared

B. Pressure

C. Microwave

D. Ultrasonic

B. Pressure

74
New cards

74. Which of the following is not a managerial control?

A. Risk assessments

B. Including security in change management processes

C. Security planning exercises

D. Implementing firewalls

D. Implementing firewalls

75
New cards

75. What purpose do third- party certificates serve for customers of cloud services?

A. They reduce costs by using bring- your- own certificates.

B. They allow certificates for domains other than the service provider's domain.

C. They provide control over cryptographic security for the customer.

D. They allow more flexibility in TLS version selection.

C. They provide control over cryptographic security for the customer.

76
New cards

76. Which of the following is not a common control focused on availability?

A. Uninterruptible power systems

B. Redundant Internet connectivity

C. Disk encryption

D. Load balancers

C. Disk encryption

77
New cards

77. What term describes a collection of honeypots on a network intended to capture information about cybersecurity threats?

A. A honeyfarm

B. A honeynet

C. A honeycluster

D. A darknet

B. A honeynet

78
New cards

78. Skip wants to implement a deterrent control to prevent physical security issues for his organization. Which of the following controls should he select?

A. A fence

B. A generator

C. Access badges

D. A camera system

A. A fence

79
New cards

79. What holds the position of the root of trust in a certificate chain?

A. A hardened hardware device

B. A TPM

C. A root certificate

D. A wildcard certificate

C. A root certificate

80
New cards

80. Jill needs to explain the concept of open public ledgers to her organization as management wants to adopt a blockchain- based system. What should she tell them about access to the ledger?

A. Members must be added by a vote of all current members.

B. Anyone can join at any time.

C. Members must be added by a vote of more than 51 percent of current members.

D. Ledgers are public but membership is private and controlled by the creator of the ledger.

B. Anyone can join at any time.

81
New cards

81. Olivia wants to use a self- signed certificate in her test environment for her organization's services to save money on commercial certificates. What warning should her team give her about the use of self- signed certificates in a test environment?

A. Certificate root of trust validation attempts will fail if implemented.

B. Self- signed certificates cannot be used for external users to support SSL.

C. Self- signed certificates cannot be used for internal users to support SSL.

D. Browsers will not allow self- signed certificates to be used when browsing sites.

A. Certificate root of trust validation attempts will fail if implemented.

82
New cards

82. Amanda is concerned about issues with dependencies that may be found during her pending change. What practice should she implement to help ensure unexpected dependency issues are not encountered?

A. Update organizational policies and procedures before the change.

B. Update functional diagrams before the change.

C. Validate the change in a test environment.

D. Document legacy applications that may create dependencies.

C. Validate the change in a test environment.

83
New cards

83. Lucca has implemented an authentication scheme that relies on ticket- granting tickets as part of the authentication process. What common authentication service has he implemented?

A. TACACS+

B. Kerberos

C. MS-CHAP

D. EAP

B. Kerberos

84
New cards

84. Jocelyn wants to select a modern encryption algorithm for use in her organization. Which of the following is a currently recommended encryption algorithm?

A. AES-256

B. SHA1

C. DES

D. Blowfish

A. AES-256

85
New cards

85. Elizabeth wants to classify the following controls by their category. What category best describes lighting, fences, bollards, and access control vestibules?

A. Technical

B. Managerial

C. Operational

D. Physical

D. Physical

86
New cards

86. Jack wants to ensure the integrity of a file that he is sending to a third party via email. How can he provide the integrity of a file to an organization that he has not done business with before?

A. Encrypt the file and send it to them.

B. Digitally sign the file.

C. Send a hash of the file in a separate email.

D. Email the file size and original name in a separate email.

B. Digitally sign the file.

87
New cards

87. Annie notices that her browser shows that the certificate for the site she is visiting is not valid. After performing some checks, she sees that the certificate is on the CA's certificate revocation list. Which of the following is not a reason for a certificate to be on a CRL?

A. The CA is compromised.

B. The certificate's private key was compromised.

C. The certificate was signed with a stolen key.

D. The certificate expired.

D. The certificate expired.

88
New cards

88. Mohinder wants to use modern, secure hashing algorithms to validate files against known good originals. Which of the following hashing algorithms should he select?

A. MD5

B. SHA-1

C. AES-256

D. SHA-256

D. SHA-256

89
New cards

89. Derrick wants to validate an encrypted and digitally signed message sent using asymmetric encryption. What does he need from the sender to validate the message?

A. The sender's private key

B. Derrick's private key

C. The sender's public key

D. Derrick's public key

C. The sender's public key

90
New cards

90. The major patch release that Susan's team installed has failed, resulting in a nonworking service. What should her team do according to change management best practices?

A. Declare an outage.

B. Follow the documented backout plan.

C. Restore from backups to the previous version.

D. Uninstall the patch and validate service function.

B. Follow the documented backout plan.

91
New cards

91. The web server that Angela's organization manages was recently compromised and the SSL certificate's private key was accessed by attackers. Angela's team has completed remediation and has created a new CSR, including a new private key that they have secured. What type of control type best describes the creation of a new key and certificate in this circumstance?

A. Corrective

B. Compensating

C. Deterrent

D. Detective

A. Corrective

92
New cards

92. Mikayla's zero- trust system has received a request for access with an identity, and the basic criteria for access have been met. What should the system do next before providing access to the resource requested?

A. Check the remote system's security status.

B. Require reauthentication using MFA.

C. Check the user's rights to ensure they can access the resource.

D. Determine its level of confidence in the request.

D. Determine its level of confidence in the request.

93
New cards

93. Charles sets up an RDP server on an isolated network segment and places a file on it called passwords.xlsx. He then configures his IPS and DLP systems to monitor for that file exiting the network segment. What type of tool has Charles deployed?

A. A honeyfile

B. A SQL trap

C. A red flag

D. A trigger file

A. A honeyfile

94
New cards

94. Lucca is using precomputed rainbow tables to attempt to crack hashed passwords from a data breach. He knows that two users have the same password, but the hashes do not match. What password hash security technique has Lucca most likely encountered?

A. Password encryption

B. Salting

C. Hash rotation

D. Password mismatching

B. Salting

95
New cards

95. What operating system is commonly associated with secure enclaves?

A. Windows

B. iOS

C. Linux

D. Android

B. iOS

96
New cards

96. Isaac is concerned that the passwords that his users are creating are too short and can be easily brute- forced if their hashes were compromised. Rather than make his users remember longer passwords, he would like to implement a technical solution to help make the hashes more resistant to cracking. What solution can he use to help with this?

A. Implement pass-the-hash algorithms.

B. Use a collision- resistant hashing algorithm.

C. Implement key stretching techniques.

D. Encrypt passwords rather than hashing them.

C. Implement key stretching techniques.

97
New cards

97. Christina wants to implement access badges printed with picture IDs for her organization, but she wants to use a wireless reader. What access badge technology is commonly implemented in scenarios like this?

A. Wi-Fi-enabled access badges

B. RFID access badges

C. Bluetooth- enabled access badges

D. NFC access badges

B. RFID access badges

98
New cards

98. Kendra's vulnerability management team has discovered that Internet of Things (IoT) devices deployed a few years ago to monitor temperatures for critical refrigerated equipment are vulnerable to a new attack. After reviewing the issue, her team has discovered that the devices are no longer supported and that the manufacturer has gone out of business. They suggest moving the devices to an isolated network to help protect them. What type of control has Kendra's team suggested?

A. A corrective control

B. A compensating control

C. A confidentiality control

D. A coordinated control

B. A compensating control

99
New cards

99. Which of the following is not a common factor in adaptive authentication for zero trust?

A. Where the user is logging in from

B. Whether the user has logged in recently from another device

C. What device the user is logging in from

D. If the device is configured correctly

B. Whether the user has logged in recently from another device

100
New cards

100. Juan's organization is designing their zero- trust model. Which of the following statements is true for network security zones?

A. All communication is secured, regardless of the network security zone it occurs in.

B. Communication receives additional security in low- trust zones.

C. Communication receives less security in high- trust zones.

D. All zero- trust networks are considered secured zones.

A. All communication is secured, regardless of the network security zone it occurs in.