Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?
A. Exposure factor
B. CVSS
C. CVE
D. Industry impact
The Common Vulnerability Scoring System (CVSS) is a standardized metric used to assess the severity of vulnerabilities, aiding organizations in prioritizing their response based on risk.
Which of the following allows a systems administrator to tune permissions for a file?
A. Patching
B. Access control list
C. Configuration enforcement
D. Least privilege
Explanation:
Why B is Correct:
An Access Control List (ACL) is a specific, granular mechanism that defines which users or system processes are granted access to objects (like files), as well as what operations (read, write, execute) are allowed on those objects. "Tuning permissions" is the direct function of modifying an ACL. A systems administrator would use commands like chmod (on Linux) or edit the security properties (on Windows) to modify the ACL for a specific file, adding or removing user/group permissions as needed.
Why A is Incorrect:
Patching is the process of applying updates (patches) to software or firmware to fix security vulnerabilities and bugs. It is a critical security function but is unrelated to the day-to-day task of modifying file and folder permissions.
Why C is Incorrect:
Configuration enforcement is a broader policy or automated process that ensures systems adhere to a predefined security baseline (e.g., using tools like SCAP, Azure Policy, or AWS Config). It is used to check and maintain configurations across many systems, not to manually "tune" a single file's permissions.
Why D is Incorrect:
Least privilege is a core security principle, not a tool or mechanism. It is the concept that users and processes should only have the minimum levels of access necessary to perform their functions. A systems administrator would use an ACL (the mechanism) to implement the principle of least privilege on a file.
Reference:
This question falls under Domain 3.0: Security Architecture, specifically covering the implementation of identity and access management controls. Understanding the difference between security principles (like least privilege) and the mechanisms that enforce them (like ACLs) is key for the SY0-701 exam.
Which of the following should a company use to provide proof of external network security testing?
A. Business impact analysis
B. Supply chain analysis
C. Vulnerability assessment
D. Third-party attestation
Third-party attestation involves an external, independent party performing a network security assessment and providing documented proof, ensuring objectivity and compliance with regulatory or client requirements.
Which of the following is the best way to validate the integrity and availability of a disaster recovery site?
A. Lead a simulated failover
B. Conduct a tabletop exercise.
C. Periodically test the generators.
D. Develop requirements for database encryption.
Explanation:
Why A is Correct:
A simulated failover is the most comprehensive way to validate both the integrity (data consistency and accuracy) and availability (readiness and operational status) of a disaster recovery (DR) site. This test involves:
Integrity:
Verifying that data replicated to the DR site is complete, uncorrupted, and consistent with the primary site.
Availability:
Confirming that systems, networks, and applications at the DR site can be brought online successfully and perform as expected under simulated disaster conditions.
This active test provides real-world validation that the DR site functions as intended, exposing any issues in replication, configuration, or operational procedures.
Why B is Incorrect:
A tabletop exercise is a discussion-based session where team members walk through hypothetical disaster scenarios. It is valuable for validating plans, roles, and communication strategies but does not actively test the technical functionality, integrity, or availability of the DR site itself.
Why C is Incorrect:
Periodically testing generators validates the power infrastructure of the DR site, which is a component of availability. However, it is a narrow test that does not address data integrity, application functionality, or overall system readiness for failover.
Why D is Incorrect:
Developing requirements for database encryption is a preventive security measure to protect data confidentiality. It is unrelated to validating the operational readiness (availability) or data correctness (integrity) of a DR site.
Reference:
This question falls under Domain 4.0: Operations and Incident Response, specifically covering disaster recovery testing strategies. The exam emphasizes the importance of active testing (e.g., failover simulations) to ensure DR sites meet recovery time objectives (RTO) and recovery point objectives (RPO), validating both integrity and availability.
A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?
A. Exemption
B. Exception
C. Avoid
D. Transfer
Explanation:
Avoid is the correct risk management strategy. This strategy involves eliminating the risk entirely by discontinuing the activity that introduces the risk. In this scenario, the company is aware of a security risk inherent to a specific market segment. By choosing not to accept responsibility and by targeting their services to a different market segment, they are completely avoiding the business activity that creates the risk. The risk is not mitigated, transferred, or accepted; it is sidestepped altogether by changing business operations.
Why the Other Options are Incorrect:
A. Exemption:
This is not a standard risk management strategy. An exemption is a release from a liability, duty, or rule granted by an authority, but it does not describe the proactive decision to change business operations to eliminate a risk.
B. Exception:
An exception in a security context typically refers to allowing a system or user to bypass a security control or policy. It is a form of risk acceptance for a specific case, not a broad strategy to change the business's target market.
D. Transfer:
Transferring risk involves shifting the financial burden of a risk to a third party, such as by purchasing cybersecurity insurance or outsourcing a risky operation through a contract. The company in this scenario is not transferring the risk; it is stopping the risky activity entirely. They are not making another party responsible for it; they are simply not engaging with it.
Reference:
This question falls under CompTIA SY0-701 Objective 5.4: "Explain the importance of policies to organizational security." Understanding and applying fundamental risk management strategies—Avoid, Transfer, Mitigate, Accept—is a core requirement for developing effective organizational policies and making informed business decisions.
A security analyst learns that an attack vector, used as part of a recent incident, was a well known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?
A. Endpoint
B. Application
C. Firewall
D. NAC
Firewall logs provide details of all network traffic, including connections to and from IoT devices. They are typically the first source of evidence for identifying the time of an exploit.
An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?
A. Behavioral analytics
B. Access control lists
C. Identity and access management
D. Network intrusion detection system
Explanation:
Behavioral analytics (also known as User and Entity Behavior Analytics - UEBA) is specifically designed to address the insider threat problem. It works by establishing a baseline of normal activity for each user and system (entity). It then uses advanced analytics, machine learning, and statistical algorithms to continuously monitor and analyze user behavior in real-time, looking for significant deviations from this established baseline
Examples of activities it can detect that may indicate an insider threat include:
A user accessing sensitive data they have never needed before.
A user downloading large volumes of data outside of business hours.
Logging in from an unusual geographic location in a short timeframe.
Multiple failed access attempts followed by a successful one.
By identifying these anomalous behaviors early, the organization can investigate and potentially stop a malicious insider or compromised account before significant damage is done. This makes it the most direct and effective tool among the choices for monitoring activities to prevent insider threats.
Why the other options are incorrect:
B. Access control lists (ACLs):
ACLs are a preventive control that dictates what a user is permitted to access (e.g., which files, systems, or network resources). They are fundamental to security but are a static permissions tool. They do not monitor or analyze user activity; they only enforce access rules. An insider threat would already have legitimate access that they could misuse, which an ACL would not prevent or detect.
C. Identity and access management (IAM):
IAM is a framework of policies and technologies for ensuring the right individuals have the appropriate access to technology resources. It is crucial for provisioning and de-provisioning access (a preventive control) but is not primarily focused on the continuous monitoring of user activity after access has been granted. It manages who has access, not how they are using it.
D. Network intrusion detection system (NIDS):
A NIDS monitors network traffic for known attack signatures and patterns of malicious activity. It is excellent for detecting threats originating from outside the network (e.g., hackers) or malware beaconing out. However, it is generally ineffective against most insider threats because the malicious activity is conducted using legitimate credentials and often does not generate the malicious network traffic patterns a NIDS is designed to look for.
Exam Objective Reference:
This question relates to Domain 1.0: Threats, Attacks, and Vulnerabilities, specifically the concept of insider threats, and Domain 4.0: Operations and Incident Response, covering security solutions like User Behavior Analysis (UBA) for monitoring and detection.
Which of the following are the best security controls for controlling on-premises access? (Select two.)
A. Swipe card
B. Picture ID
C. Phone authentication application
D. Biometric scanner
E. Camera
F. Memorable
Explanation:
For controlling on-premises physical access, the best security controls are those that enforce authentication and authorization at entry points (e.g., doors, gates). These typically involve something you have (a physical token) and/or something you are (a biological trait):
A. Swipe card (or access card):
A physical token (something you have) that grants access when presented to a reader. It is widely used for its balance of security and convenience.
D. Biometric scanner (e.g., fingerprint, retina scan):
Uses unique biological traits (something you are) for high-assurance authentication. It is difficult to forge or share, making it effective for restricting access.
Why the others are incorrect:
B. Picture ID:
While useful for visual verification by security personnel, it relies on human judgment and is prone to forgery or social engineering. It is not an automated access control mechanism.
C. Phone authentication application:
This is typically used for logical access (e.g., multi-factor authentication for apps or systems), not physical access to facilities.
E. Camera:
A detective control used for surveillance and auditing, but it does not actively prevent or control access. It records events after they occur.
F. Memorable (e.g., passwords/PINs):
Used for logical access (something you know), not physical access. PINs are sometimes combined with cards but are weaker alone due to sharing or guessing risks.
Reference:
This aligns with Domain 5.5: Explain the importance of physical security controls. Physical access controls often combine multiple factors (e.g., card + biometric) to enhance security, as outlined in best practices for protecting facilities and critical infrastructure.
A company is changing its mobile device policy. The company has the following
requirements:
A. BYOD
B. CYOD
C. COPE
D. COBO
Explanation:
COPE (Corporate-Owned, Personally Enabled) best meets all the requirements:
Company-owned devices:
COPE involves the company purchasing and owning the devices.
Ability to harden the devices:
Since the company owns the devices, it has full control over security policies, such as enforcing encryption, requiring strong passwords, installing mandatory security software, and remotely wiping devices if lost or stolen.
Reduced security risk:
With full control over device configuration and security policies, the company can significantly reduce risks compared to personal devices.
Compatibility with company resources:
Company-owned devices can be pre-configured to ensure seamless and secure access to corporate resources like email, apps, and networks.
Why the others are incorrect:
A. BYOD (Bring Your Own Device):
Employees use their personal devices. This does not meet the "company-owned" requirement, reduces the company's ability to harden devices (less control), and increases security risks due to varying device security and personal use.
B. CYOD (Choose Your Own Device):
Employees choose from a list of company-approved devices, but the devices may still be personally owned or lack full company control. It does not guarantee the same level of hardening or reduced risk as fully company-owned devices.
D. COBO (Corporate-Owned, Business-Only):
Devices are company-owned and used exclusively for business purposes. While this meets most requirements, it does not allow for personal use ("Personally Enabled"), which may be implied as desirable for flexibility. COPE offers a balance by allowing personal use while maintaining strong security controls.
Reference:
This aligns with SY0-701 Objective 3.5 ("Given a scenario, implement policies for mobile devices"). COPE is a common mobile device management strategy that provides a balance between security control and user flexibility, making it ideal for organizations seeking to harden devices while allowing limited personal use.
A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added. Which of the following would be the best solution to meet these objectives?
A. Load balancing
B. Fault tolerance
C. Proxy servers
D. Replication
Explanation:
Why A is Correct:
Load balancing is the best solution to meet both objectives:
High Availability:
Load balancers distribute incoming network traffic across multiple servers. If one server fails, the load balancer automatically redirects traffic to the remaining healthy servers, ensuring continuous service availability with minimal disruption.
Minimal Effort for Replacement/Addition:
In a load-balanced environment, new servers can be added to the pool (or failed servers replaced) with minimal configuration changes. The load balancer dynamically incorporates new servers into the distribution pool, often without requiring downtime or complex reconfiguration for the entire system.
Why B is Incorrect:
Fault tolerance (e.g., RAID arrays, redundant hardware) focuses on ensuring a single system continues operating despite component failures. It does not inherently provide high availability at the application level (e.g., if the entire server fails) and may require significant effort to replace or add entire systems.
Why C is Incorrect:
Proxy servers primarily handle requests on behalf of clients for purposes like caching, filtering, or anonymity. They are not designed to distribute traffic across multiple backend servers for high availability or to simplify server replacement/addition.
Why D is Incorrect:
Replication (e.g., database replication) copies data to multiple servers for redundancy but does not inherently manage traffic distribution. While it supports availability, it often requires manual intervention to redirect traffic or promote a replica in case of failure, and adding/replacing servers can be complex.
Reference:
This question falls under Domain 2.0: Architecture and Design, specifically covering high availability and scalability strategies. Load balancers are a key technology for achieving both fault tolerance (through traffic redistribution) and operational flexibility (ease of scaling server infrastructure).
Which of the following activities should a systems administrator perform to quarantine a potentially infected system?
A. Move the device into an air-gapped environment.
B. Disable remote log-in through Group Policy.
C. Convert the device into a sandbox
D. Remote wipe the device using the MDM platform
Quarantining a potentially infected system by placing it into an air-gapped environment physically disconnects it from the network. This prevents the spread of malware while maintaining the integrity of forensic evidence.
Which of the following types of vulnerabilities is primarily caused by improper use and management of cryptographic certificates?
A. Misconfiguration
B. Resource reuse
C. Insecure key storage
D. Weak cipher suites
Explanation:
The correct answer is C. Insecure key storage.
The question asks for a vulnerability primarily caused by improper use and management of cryptographic certificates. The most direct and critical failure in certificate management is how the private keys associated with those certificates are protected.
Insecure key storage refers to the practice of storing cryptographic private keys in a location or manner that makes them vulnerable to theft or unauthorized access. Examples include:
Storing private keys on a web server's file system with weak permissions.
Embedding keys hard-coded in application source code.
Using software-based storage without adequate encryption or access controls instead of a Hardware Security Module (HSM).
If an attacker gains access to a private key, they can impersonate the legitimate certificate holder, decrypt sensitive traffic, or sign malicious code. This vulnerability is a direct result of the improper management of the certificate's most critical component: its private key.
Why the other options are incorrect:
A. Misconfiguration:
While misconfiguration is a broad category that could include insecure key storage, it is not the primary or most specific cause. Misconfiguration encompasses a much wider range of issues, such as leaving unnecessary ports open, using default accounts, or improper cloud storage bucket permissions. The question specifically narrows the focus to "cryptographic certificates," making "insecure key storage" a more precise and accurate answer.
B. Resource reuse:
This is a distractor. In cryptography, "resource reuse" might vaguely refer to problems like nonce reuse in certain encryption algorithms, which can break security. However, it is not a term commonly associated with the overarching management and use of cryptographic certificates. Certificate management is about issuance, storage, rotation, and revocation—not about the reuse of computational resources.
D. Weak cipher suites:
The use of weak cipher suites (e.g., RC4, SSLv2, DES) is a vulnerability related to the selection of cryptographic algorithms, not the management of the certificates themselves. A certificate can be perfectly managed (e.g., its private key stored securely in an HSM) but still be used with a weak cipher suite by a misconfigured server. The vulnerability of weak ciphers is separate from the lifecycle management of the certificate.
Reference:
This concept is central to Public Key Infrastructure (PKI) and is covered in the CompTIA Security+ SY0-701 objectives under Domain 3.3: Given a scenario, implement secure protocols. A core tenet of PKI is that the security of the entire system relies on the secrecy of private keys. Therefore, their storage is the most critical aspect of management
Best practices and standards (e.g., from NIST) heavily emphasize the use of Hardware Security Modules (HSMs) or secure, dedicated key management services to prevent the vulnerability of insecure key storage. The compromise of a private key due to poor storage is a catastrophic failure in certificate management.
Page 28 out of 60 Pages |
Previous |