CompTIA Security+ Course by HAMDI AHMED JABER - Final Exam
40 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a key characteristic of a 'fail open' system?

  • It destroys all data to ensure no unauthorized access occurs.
  • It prioritizes security by blocking access during a failure.
  • It prioritizes availability by remaining accessible during a failure. (correct)
  • It immediately alerts administrators of the failure without any other action.

Which device operates by actively participating in processing and managing network traffic, making decisions based on inputs?

  • A router (correct)
  • An intrusion detection system
  • A passive network sensor
  • A network tap

What is the primary function of a jump server?

  • To directly expose production systems to external networks.
  • To provide load balancing across multiple web servers.
  • To cache frequently accessed data for faster retrieval.
  • To act as a secure intermediary for accessing systems in a restricted network. (correct)

Why is it important that an IPS (Intrusion Prevention System) is placed 'in line' within a network?

<p>To enable it to block malicious traffic in real time. (B)</p> Signup and view all the answers

Which of the following is the primary function of a load balancer?

<p>To distribute incoming network traffic across multiple servers. (D)</p> Signup and view all the answers

Which protocol is commonly used for port security and network access control, authenticating devices attempting to connect to a network?

<p><code>802.1X</code> (A)</p> Signup and view all the answers

What is the primary function of a Web Application Firewall (WAF)?

<p>To secure web applications by filtering and monitoring HTTP traffic. (A)</p> Signup and view all the answers

What is deep packet inspection, as utilized in Next-Generation Firewalls (NGFWs)?

<p>Examining the data portion of network packets to identify and block sophisticated attacks. (A)</p> Signup and view all the answers

In the context of data protection, what is the key function of 'hashing'?

<p>To ensure data integrity by transforming data into a fixed-length, irreversible value. (B)</p> Signup and view all the answers

What is the relationship between RTO (Recovery Time Objective) and a hot site, relative to a cold site, in disaster recovery planning?

<p>A hot site typically aims for a shorter RTO than a cold site. (A)</p> Signup and view all the answers

What is the primary purpose of implementing 'layered defense', also known as 'defense in depth'?

<p>To ensure that if one security control fails, others are in place to continue protecting assets. (C)</p> Signup and view all the answers

Which data state requires specialized encryption techniques like homomorphic encryption to protect data during active processing?

<p>Data in use (D)</p> Signup and view all the answers

What is the main benefit of using a multi-cloud strategy for an organization's data and services?

<p>It reduces the risk of vendor lock-in and enhances fault tolerance through distributing workloads. (B)</p> Signup and view all the answers

Which of the following is the least costly type of disaster recovery site, but also requires the longest time to become operational?

<p>Cold site (D)</p> Signup and view all the answers

An organization that needs to comply with GDPR mandates must ensure what regarding its EU citizens' data?

<p>The data is stored within the European Union or compliant jurisdictions. (B)</p> Signup and view all the answers

What is the primary goal of 'capacity planning' in the context of organizational resilience?

<p>To accurately forecast and manage the resources needed to maintain operations, especially during disruptions or periods of growth. (A)</p> Signup and view all the answers

What does platform diversity in security architecture primarily aim to achieve?

<p>To increase resilience by using different hardware and software configurations to minimize risk from single points of failure. (D)</p> Signup and view all the answers

Which of the following best describes the purpose of a 'failover test' in resilience and recovery planning?

<p>To test the automatic switching from a primary system to a backup system in case of failure. (D)</p> Signup and view all the answers

Consider a scenario where a company's primary data center faces a severe power outage due to a regional grid failure. Despite having a well-configured hot site, the recovery process is significantly delayed because the backup generators at the hot site fail to start. Which of the following resilience and recovery planning aspects was most likely overlooked, leading to this situation?

<p>Regular testing and maintenance of backup power systems at the hot site. (A)</p> Signup and view all the answers

An organization implements a sophisticated data loss prevention (DLP) system. The system is tuned to identify and block the transmission of sensitive data outside the network. However, an attacker leverages a novel steganography technique to embed confidential data within seemingly innocuous image files, evading the DLP system's detection capabilities. Which of the following security measures would be most effective in mitigating this type of advanced threat?

<p>Conducting regular security audits that include analysis of outbound network traffic for anomalous data patterns. (A)</p> Signup and view all the answers

What is the primary goal of Data Loss Prevention (DLP) systems?

<p>To ensure sensitive data remains within organizational boundaries. (C)</p> Signup and view all the answers

Which of the following is a key function of Network Access Control (NAC)?

<p>Regulating device access to the network based on predefined security policies. (D)</p> Signup and view all the answers

What is the primary benefit of Extended Detection and Response (XDR) compared to Endpoint Detection and Response (EDR)?

<p>XDR provides a holistic view of threats across multiple security layers, while EDR focuses on endpoints. (A)</p> Signup and view all the answers

What is the main purpose of User Behavior Analytics (UBA)?

<p>To detect anomalies and potential security threats based on deviations from normal user activity. (A)</p> Signup and view all the answers

What is the concept of 'least privilege' in the context of Identity and Access Management (IAM)?

<p>Assigning only the minimum permissions necessary for users to perform their tasks. (C)</p> Signup and view all the answers

How does Lightweight Directory Access Protocol (LDAP) typically function within a Single Sign-On (SSO) environment?

<p>LDAP provides a centralized directory of user information for authentication and authorization in SSO. (B)</p> Signup and view all the answers

In the context of access control, what distinguishes Mandatory Access Control (MAC) from Discretionary Access Control (DAC)?

<p>MAC uses security classifications set by the organization, and it is cannot be modified by the user, while DAC is managed at the discretion of the resource owner. (A)</p> Signup and view all the answers

Which access control model assigns permissions based on predefined roles within an organization?

<p>Role-Based Access Control (RBAC) (B)</p> Signup and view all the answers

What is the key characteristic of Attribute-Based Access Control (ABAC) that differentiates it from other access control methods?

<p>It uses highly granular and flexible policies that are dynamic and context-aware, based on user and resource attributes. (A)</p> Signup and view all the answers

Imagine a scenario where a global corporation wants to implement highly granular access control to sensitive financial data. Access should be granted based on a combination of factors including the user's department, job role, location, the sensitivity level of the data, and even the time of day. Furthermore, the system needs to adapt dynamically to changes in these attributes. Which access control model is best suited for such a complex and adaptive requirement?

<p>Attribute-Based Access Control (ABAC) (A)</p> Signup and view all the answers

Which of the following is an example of 'something you are' in the context of multi-factor authentication (MFA)?

<p>A biometric fingerprint scan. (B)</p> Signup and view all the answers

What is the primary benefit of implementing 'just-in-time' (JIT) permissions within a Privileged Access Management (PAM) system?

<p>It reduces the attack surface by minimizing the window of opportunity for abuse. (C)</p> Signup and view all the answers

Which of the following is NOT a typical benefit of using password managers?

<p>Automatically bypassing multi-factor authentication for convenience. (A)</p> Signup and view all the answers

What is the main goal of regularly updating firmware on IoT devices?

<p>To patch security vulnerabilities and protect against exploits. (C)</p> Signup and view all the answers

An organization's incident response plan includes a 'lessons learned' phase. What is the primary objective of this phase?

<p>To identify areas for improvement in future incident response efforts. (B)</p> Signup and view all the answers

What is the purpose of a 'legal hold' in digital forensics?

<p>To preserve potentially relevant data when litigation is anticipated. (C)</p> Signup and view all the answers

Which of the following is a critical component of change management procedures?

<p>Detailed, step-by-step instructions (D)</p> Signup and view all the answers

What is the key difference between 'guidelines' and 'policies' in security governance?

<p>Policies are mandatory, while guidelines are recommendations. (D)</p> Signup and view all the answers

In quantitative risk analysis, what does the Annualized Rate of Occurrence (ARO) represent?

<p>The estimated number of times a risk is expected to occur in a year. (C)</p> Signup and view all the answers

An organization has implemented network segmentation as a containment strategy during an incident response. However, lateral movement by the attacker is still occurring, but significantly slower. Which of the following is the MOST likely reason segmentation is not fully effective?

<p>The segmentation was improperly configured, allowing some communication paths between segments. (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser