CompTIA Security+ Exam SY0-701 Dumps
30 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary cause of workstations on the LAN becoming infected with malware?

  • IPS
  • Forward proxy
  • HIDS
  • Awareness training (correct)

Which biometric authentication method is based on recognizing the unique pattern of blood vessels in the retina?

  • Gait
  • Retina (correct)
  • Signature
  • Voice

Why are users on the LAN being tricked into clicking on malicious URLs?

  • Lack of antivirus software
  • Incorrect DNS settings
  • Weak encryption protocols
  • No internal controls exist to evaluate URL safety (correct)

What makes retina authentication virtually impossible to duplicate or bypass?

<p>Unique pattern of blood vessels (C)</p> Signup and view all the answers

What is the common purpose of a RAT (Remote Access Trojan) when infecting a computer?

<p>Stealthy unauthorized access (B)</p> Signup and view all the answers

What technology should be implemented to educate users about the risks associated with clicking on malicious URLs?

<p>Awareness training (C)</p> Signup and view all the answers

What is the primary concern a company using drones for perimeter monitoring should have?

<p>Privacy (A)</p> Signup and view all the answers

Why has the malware in the scenario evaded detection by traditional antivirus software?

<p>Utilizes polymorphic techniques (A)</p> Signup and view all the answers

Which factor might raise privacy concerns when using drones for perimeter monitoring?

<p>Collecting video and images of individuals (C)</p> Signup and view all the answers

What feature of a worm differentiates it from other types of malware?

<p>Exploits system vulnerabilities to spread autonomously (D)</p> Signup and view all the answers

What security measure can a company using drones implement to address privacy concerns?

<p>Restricting access to telemetry data (A)</p> Signup and view all the answers

How does adding a software application to the whitelist help resolve issues related to security policies blocking its execution?

<p>Allows the program to run without any restrictions (A)</p> Signup and view all the answers

What is the primary role of the white team during a penetration testing exercise?

<p>Providing oversight and support (A)</p> Signup and view all the answers

Which team determines the rules and guidelines of a penetration testing exercise?

<p>Purple team (B)</p> Signup and view all the answers

What type of document did Ann receive from her mortgage company regarding sharing her PII?

<p>Annual privacy notice (D)</p> Signup and view all the answers

In a penetration testing exercise, which team is responsible for monitoring the progress of the teams?

<p>Green team (B)</p> Signup and view all the answers

What is the main purpose of an annual privacy notice from a financial institution?

<p>Outlining the institution's privacy policy (B)</p> Signup and view all the answers

Which team in a penetration testing exercise is responsible for providing feedback on security measures?

<p>Green team (B)</p> Signup and view all the answers

What is the primary concern the stakeholders have with the guest wireless network?

<p>Minimizing disruptions during meetings (A)</p> Signup and view all the answers

Which aspect of the WAPs' configuration helps in restricting access to only the conference rooms?

<p>Decreased power levels and antenna coverage (A)</p> Signup and view all the answers

How does configuring the guest wireless network on a separate VLAN protect the company's internal network?

<p>It isolates guest traffic from company resources (D)</p> Signup and view all the answers

What security measure would be least effective in preventing visitors from accessing company resources?

<p>Decreasing the power levels of access points (D)</p> Signup and view all the answers

Which action would be most appropriate if the company wanted to enhance security further without hindering visitor access?

<p>Employing intrusion detection systems on the guest network (B)</p> Signup and view all the answers

What additional step could be taken to ensure that the guest wireless network remains isolated from the company's internal resources?

<p>'Regular penetration testing on the guest network (A)</p> Signup and view all the answers

What is the main purpose of hacktivists using cyberattacks?

<p>To disrupt services and expose information (D)</p> Signup and view all the answers

Which term describes a sovereign state with a centralized government and defined territory?

<p>Nation-state (A)</p> Signup and view all the answers

Who are nation-state actors?

<p>Individuals or groups conducting cyberattacks on behalf of a nation-state (C)</p> Signup and view all the answers

What are some reasons nation-state actors may target others?

<p>For espionage, sabotage, influence, or retaliation (B)</p> Signup and view all the answers

What does SIEM stand for?

<p>Security Information and Event Management (A)</p> Signup and view all the answers

How does SIEM help in cybersecurity?

<p>By providing real-time monitoring and alerting of security events (B)</p> Signup and view all the answers

Flashcards

Awareness training

Educating users about the risks of clicking malicious URLs can be done by implementing awareness training programs to help them identify and avoid potential threats.

Retina authentication

Retina authentication uses a unique pattern of blood vessels in the retina to identify individuals, making it almost impossible to duplicate or bypass.

Remote Access Trojan (RAT)

A RAT (Remote Access Trojan) is designed to grant stealthy unauthorized access to an infected computer, allowing attackers to control it remotely.

Polymorphic malware

Polymorphic techniques allow malware to evade detection by antivirus software by constantly changing its structure and code, making it difficult to identify and block.

Signup and view all the flashcards

Worm

A worm is a type of malware that spreads autonomously by exploiting system vulnerabilities, replicating itself to infect multiple devices without user intervention.

Signup and view all the flashcards

Privacy concerns with drones

The primary concern regarding using drones for perimeter monitoring is protecting individual privacy, as drones collect video and images that may contain personally identifiable information.

Signup and view all the flashcards

Whitelist for software applications

Adding a software application to the whitelist allows it to execute without restrictions, resolving security policy issues that prevented it from running.

Signup and view all the flashcards

White team in penetration testing

The white team in a penetration testing exercise provides oversight and support, ensuring the exercise adheres to ethical guidelines and legal regulations.

Signup and view all the flashcards

Purple team in penetration testing

The purple team defines the rules and guidelines for the penetration testing exercise, ensuring a balanced approach between red and blue teams.

Signup and view all the flashcards

Annual privacy notice

An annual privacy notice from a financial institution outlines its privacy policy, informing customers about how their personal information is collected, used, shared, and protected.

Signup and view all the flashcards

Green team in penetration testing

The green team in penetration testing provides feedback on security measures, reviewing the effectiveness of existing controls and recommending improvements.

Signup and view all the flashcards

Hacktivists

Hacktivists use cyberattacks to disrupt services, expose confidential information, or advance political agendas.

Signup and view all the flashcards

Nation-state

A nation-state is a sovereign state with a centralized government and defined territory, often involved in international affairs.

Signup and view all the flashcards

Nation-state actors

Nation-state actors are individuals or groups conducting cyberattacks on behalf of a nation-state, often for espionage, sabotage, influence, or retaliation.

Signup and view all the flashcards

SIEM

SIEM stands for Security Information and Event Management, a technology that collects, analyzes, and correlates security data from various sources.

Signup and view all the flashcards

SIEM in cybersecurity

SIEM helps in cybersecurity by providing real-time monitoring of security events, detecting anomalies, generating alerts, and enabling faster incident response.

Signup and view all the flashcards

Lack of user awareness

The primary cause of workstations on the LAN becoming infected with malware is often a lack of user awareness and training, leading to them clicking on malicious URLs or downloading infected files.

Signup and view all the flashcards

Lack of URL safety controls

No internal controls exist to evaluate the safety of URLs clicked by LAN users, making them vulnerable to malicious websites and phishing attacks.

Signup and view all the flashcards

Privacy concerns

The primary concern regarding a company using drones for perimeter monitoring is protecting the privacy of individuals. Drones collect video and images that may contain personally identifiable information.

Signup and view all the flashcards

Guest wireless network VLAN

The guest wireless network should be configured on a separate VLAN to isolate guest traffic from company resources, preventing potential security breaches.

Signup and view all the flashcards

Intrusion detection systems (IDS) on guest network

Employing intrusion detection systems on the guest network can enhance security by identifying and alerting about suspicious activities, helping to protect the company's resources.

Signup and view all the flashcards

Penetration testing of guest network

Regular penetration testing on the guest network helps identify vulnerabilities and assess security risks, ensuring it remains isolated from the company's internal resources.

Signup and view all the flashcards

Restricted wireless access

Decreasing the power levels and antenna coverage of access points can restrict access to only the conference rooms, limiting the range of the guest wireless network.

Signup and view all the flashcards

Minimizing disruptions

Minimizing disruptions during meetings is the primary concern regarding the guest wireless network, ensuring visitors have access to Wi-Fi without impacting the company's internal network.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser