CompTIA Security+ Exam: Security Controls
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A company implements mandatory vacations for all employees, where another employee temporarily covers their responsibilities. Which security control type does this BEST represent?

  • Detective (correct)
  • Preventive
  • Corrective
  • Directive

Which of the following is the PRIMARY goal of 'availability' within the CIA triad?

  • Ensuring data is accessible to authorized users when needed. (correct)
  • Providing proof of actions to prevent denial.
  • Maintaining the correctness and completeness of data.
  • Preventing unauthorized access to sensitive information.

Implementing load balancers for web servers primarily addresses which aspect of the CIA triad?

  • Non-Repudiation
  • Availability (correct)
  • Integrity
  • Confidentiality

An organization uses digital signatures to ensure that employees cannot deny having signed off on critical policy documents. Which security principle is being enforced?

<p>Non-Repudiation (C)</p> Signup and view all the answers

A highly secure facility requires three different forms of authentication: a fingerprint scan, a smart card, and a PIN. What authentication factors are being employed?

<p>Something you are, something you have, and something you know. (C)</p> Signup and view all the answers

Which type of security control is primarily implemented and executed by people to ensure day-to-day compliance with security policies?

<p>Operational (B)</p> Signup and view all the answers

A company implements security cameras and perimeter fences around its data center. Which category of security controls do these measures represent?

<p>Physical (C)</p> Signup and view all the answers

Which of the following best describes a 'deterrent' security control?

<p>A control that discourages violations of security policies. (A)</p> Signup and view all the answers

An organization's security policy mandates routine vulnerability assessments. Under which category of security controls does this fall?

<p>Managerial (B)</p> Signup and view all the answers

In a scenario where an organization implements both biometric authentication for server access and conducts regular security awareness training for all employees, what primary security principle is being applied?

<p>Defense in Depth (B)</p> Signup and view all the answers

Which access control model relies on predefined roles and job functions to assign permissions?

<p>Role-Based Access Control (RBAC) (B)</p> Signup and view all the answers

In a Zero Trust security model, what principle is most important in securing access to resources?

<p>Never trust, always verify (B)</p> Signup and view all the answers

What is the primary goal of conducting a Gap Analysis in security?

<p>To compare the current security posture against a desired security standard. (C)</p> Signup and view all the answers

Which of the following is NOT typically a component of a zero-trust security plan?

<p>Implicit Trust Zones (A)</p> Signup and view all the answers

In the context of Public Key Infrastructure (PKI), what role does the Certificate Authority (CA) play?

<p>Issuing and managing digital certificates. (C)</p> Signup and view all the answers

An organization implements a network of honeypots that simulate a complete system environment. What is the MOST likely strategic goal behind using this type of deception technology?

<p>To create a highly realistic attack surface that actively attracts and diverts sophisticated attackers, thereby exhausting their resources and gaining deep insights into their methods. (C)</p> Signup and view all the answers

Which protocol is specifically designed to provide real-time validation of digital certificates?

<p>Online Certification Status Protocol (OCSP) (C)</p> Signup and view all the answers

What is the primary function of a Certificate Signing Request (CSR)?

<p>To request a certificate from a certification authority (C)</p> Signup and view all the answers

Which type of digital certificate is used for basic website encryption?

<p>Domain Validation Certificate (A)</p> Signup and view all the answers

What is the primary purpose of a Hardware Security Module (HSM)?

<p>To provide a secure environment for generating and storing cryptographic keys (A)</p> Signup and view all the answers

In the context of data protection, what does tokenization primarily achieve?

<p>Data replacement for information safety (D)</p> Signup and view all the answers

How does salting enhance the security of hashing algorithms?

<p>By adding random data before hashing (C)</p> Signup and view all the answers

Which cryptographic process relies on the sender's private key to create a digital signature?

<p>Asymmetric Encryption (A)</p> Signup and view all the answers

Consider a scenario where an attacker exploits a vulnerability in an organization's email server to distribute phishing emails. Identify all of the components or methods that represent the 'attack surface' in this context. Select all that apply:

<p>SMTP, IMAP, and POP3 protocols running on the email server. (B), User email clients (desktop, mobile, or web-based). (C)</p> Signup and view all the answers

Which of the following is NOT typically considered an attack surface in the context of communication systems?

<p>End-user License Agreements (A)</p> Signup and view all the answers

Which of the following accurately describes the threat vector known as 'Smishing'?

<p>Phishing attacks conducted through SMS messages (C)</p> Signup and view all the answers

In the context of image-based communication, which of the following represents a threat vector?

<p>Embedding malicious code within image metadata (A)</p> Signup and view all the answers

Which communication method is most closely associated with 'vishing'?

<p>Voice Calls (C)</p> Signup and view all the answers

Which of the following is a primary risk associated with the use of removable devices?

<p>Malware spread (D)</p> Signup and view all the answers

What is a key characteristic of 'agent-less' software attack surfaces?

<p>Software accessed remotely without local installation (C)</p> Signup and view all the answers

What security vulnerability is most directly associated with open service ports?

<p>Exploitation of unpatched services (A)</p> Signup and view all the answers

What is the primary objective of Business Email Compromise (BEC) attacks?

<p>To steal financial information through fraudulent transactions (B)</p> Signup and view all the answers

Which threat vector is MOST directly related to manipulating individuals into divulging confidential information by impersonating authority figures?

<p>Pretexting (A)</p> Signup and view all the answers

Consider a scenario where an attacker compromises a website frequently visited by employees of a specific company and injects it with malware, which then infects the computers of these employees. Which type of attack does this BEST describe?

<p>Watering hole attack (B)</p> Signup and view all the answers

Which of the following scenarios best exemplifies typosquatting?

<p>A threat actor registers 'gooogle.com' to deceive users who misspell 'google.com', potentially leading them to a malicious website. (B)</p> Signup and view all the answers

Why is reducing the attack surface considered a crucial security measure?

<p>It minimizes the number of potential vulnerabilities and entry points, thereby reducing the opportunities for attackers to compromise the system. (C)</p> Signup and view all the answers

In the context of system security, what is the primary role of 'threat vectors'?

<p>To serve as the methods or pathways attackers use to breach or compromise a system. (A)</p> Signup and view all the answers

Which of the following scenarios represents steganography as a threat vector?

<p>An attacker conceals malicious code within an image file shared on a social media platform. (C)</p> Signup and view all the answers

A security analyst observes multiple failed login attempts followed by a successful login from an unfamiliar location. Further investigation reveals that the account's password was recently changed. Which of the following attack vectors is MOST likely?

<p>A brute-force attack followed by successful credential stuffing. (A)</p> Signup and view all the answers

An organization's security team detects a sudden and significant increase in outbound network traffic to a known command-and-control server, coupled with reports of several user accounts exhibiting unusual activity, such as accessing files they don't normally interact with. However, all systems are reporting normal CPU and memory usage, and endpoint detection tools show no signs of malware. Which of the following attack vectors is MOST likely?

<p>An insider threat leveraging stolen credentials to exfiltrate sensitive data. (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser