A security analyst is creating base for the server team to follow when hardening new devices for deployment. Which of the following beet describes what the analyst is creating?
A. Change management procedure
B. Information security policy
C. Cybersecurity framework
D. Secure configuration guide
Explanation:
Secure configuration guide (D) is the correct answer. A secure configuration guide (or baseline) is a set of detailed, step-by-step instructions and settings designed to harden a system against attacks. It provides a standardized, secure starting point for deploying new devices (like servers). This is exactly what the security analyst is creating for the server team to follow.
Why the others are incorrect:
A) Change management procedure:
This is a process that governs how changes are proposed, approved, tested, and implemented in an IT environment. It is a procedural workflow to prevent disruptions, not a technical document with specific security settings for hardening a new device.
B) Information security policy:
This is a high-level management document that outlines the organization's overall security goals, roles, and responsibilities. It sets the "what" and "why" for security but does not provide the low-level, technical "how" for hardening a specific server OS or application.
C) Cybersecurity framework:
A framework (like NIST CSF or ISO 27001) provides a broad structure of best practices, standards, and guidelines for managing an organization's cybersecurity risk. It is a strategic tool, not a tactical, technical document for system hardening.
Reference:
This question tests knowledge of Domain 5.4: Explain the importance of personnel management and security awareness training and Domain 3.2: Given a scenario, implement security hardening strategies. Creating a secure configuration guide is a fundamental step in the hardening process, ensuring consistency and security across all new deployments. These guides are often based on industry benchmarks from organizations like CIS (Center for Internet Security).
A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:
. Something you know
. Something you have
. Something you are
Which of the following would accomplish the manager's goal?
A. Domain name, PKI, GeolP lookup
B. VPN IP address, company ID, facial structure
C. Password, authentication token, thumbprint
D. Company URL, TLS certificate, home address
Explanation:
C) Password, authentication token, thumbprint is the correct answer. This option perfectly aligns with the three factors of authentication:
Something you know:
Password (a secret only the user should know).
Something you have:
Authentication token (a physical device like a hardware token or a software-generated code, such as from an authenticator app).
Something you are:
Thumbprint (a biometric factor, unique to the individual)
This combination provides strong multifactor authentication (MFA) for securing VPN access.
Why the others are incorrect:
A) Domain name, PKI, GeoIP lookup:
- Domain name is public information (not something you know secretly).
- PKI (Public Key Infrastructure) is a technology framework, not an authentication factor.
- GeoIP lookup is a location-based check, which is not a standard MFA factor (it might be used for risk-based authentication but doesn't fit the classic three factors).
B) VPN IP address, company ID, facial structure:
- VPN IP address is public or assigned information (not a secret).
- Company ID is something you have, but facial structure (something you are) is valid. However, the first factor (IP address) is not "something you know."
D) Company URL, TLS certificate, home address:
- Company URL is public information.
- TLS certificate is a cryptographic entity (not something you have in the typical MFA sense).
- Home address is public information (not biometric).
Reference:
This question tests knowledge of Domain 2.4: Explain authentication and authorization controls and Domain 3.6: Given a scenario, implement authentication and authorization solutions. Multifactor authentication (MFA) is a core security principle, and the SY0-701 objectives emphasize the use of multiple factors (knowledge, possession, inherence) to enhance security for remote access solutions like VPNs.
After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?
A. Compensating
B. Detective
C. Preventive
D. Corrective
Explanation:
Detective controls are designed to identify and detect security incidents after they have occurred. Reviewing log files is a classic example of a detective control. It allows administrators to investigate past events, understand the scope of an incident (like a ransomware attack), and gather evidence for analysis and response.
Why not A?
Compensating: Compensating controls are alternative measures put in place when primary controls are not feasible or effective. They are proactive rather than reactive. For example, if encryption isn't possible, strict access controls might compensate. Log review doesn't compensate for a lack of other controls; it detects breaches.
Why not C?
Preventive: Preventive controls aim to stop security incidents from happening in the first place. Examples include firewalls, access controls, and encryption. Reviewing logs after an attack does not prevent the attack; it helps discover what already happened.
Why not D?
Corrective: Corrective controls focus on mitigating damage and restoring systems after an incident. Examples include restoring from backups (for ransomware) or patching vulnerabilities. While log review might inform corrective actions, the act of reviewing logs itself is detective, not corrective.
Reference:
Domain 5.1: "Explain the importance of security concepts in an enterprise environment." The SY0-701 objectives categorize security controls into preventive, detective, corrective, and compensatory. Detective controls, such as log reviews and intrusion detection systems, are essential for identifying and understanding security events post-occurrence.
An administrator must replace an expired SSL certificate. Which of the following does the administrator need to create the new SSL certificate?
A. CSR
B. OCSP
C. Key
D. CRL
Explanation:
Replacing an expired SSL/TLS certificate is a common administrative task. The process requires generating a new certificate signing request from the server that will use the certificate.
A. CSR (Certificate Signing Request) is correct.
A CSR is a standardized block of encoded text that contains the public key and identifying information (e.g., common name/domain name, organization, locality) for the entity requesting the certificate. The administrator generates this on the web server. This CSR is then submitted to a Certificate Authority (CA) to be validated and signed. The CA uses the information in the CSR to create the new, trusted SSL certificate.
B. OCSP (Online Certificate Status Protocol) is incorrect.
OCSP is a protocol used to check the revocation status of a certificate in real-time (i.e., to see if it has been revoked before its expiration date). It is not used to create a new certificate.
C. Key is incorrect.
While a new public/private key pair is often generated as part of the process of creating a CSR, the key itself is not what is sent to the CA. The private key must be kept secret on the server. The public key is embedded within the CSR. The term "Key" alone is too vague and not the specific item needed for the creation request.
D. CRL (Certificate Revocation List) is incorrect.
A CRL is a list of certificates that have been revoked by the CA before their expiration date. It is another method (like OCSP) for checking revocation status. It is not used to create new certificates.
Reference:
CompTIA Security+ SY0-701 Objective 3.9: "Explain public key infrastructure (PKI) concepts." The process of obtaining a certificate, which includes generating a CSR and the role of the Certificate Authority, is a core concept within this objective.
An employee receives a text message from an unknown number claiming to be the company's Chief Executive Officer and asking the employee to purchase several gift cards. Which of the following types of attacks does this describe?
A. Vishing
B. Smishing
C. Pretexting
D. Phishing
Explanation:
This scenario describes smishing, which is a form of phishing attack conducted via SMS (text messages). The attacker pretends to be a trusted authority (e.g., the CEO) and uses social engineering to trick the recipient into taking an action, such as purchasing gift cards. The term "smishing" combines "SMS" and "phishing."
Analysis of Incorrect Options:
A. Vishing:
Vishing is phishing done through voice calls (e.g., a phone call pretending to be from tech support).
C. Pretexting:
Pretexting involves creating a fabricated scenario (a pretext) to steal information, but it is not specific to text messages. Smishing often uses pretexting as a tactic, but the medium defines it as smishing.
D. Phishing:
Phishing is a broader term for fraudulent attempts to obtain sensitive information, typically via email. Since this attack uses text messages, it is specifically smishing.
Reference:
This falls under Domain 1.0: General Security Concepts, specifically social engineering attacks. Smishing is highlighted in CompTIA Security+ objectives and resources like the FTC’s guidelines on avoiding text scams.
A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?
A. A thorough analysis of the supply chain
B. A legally enforceable corporate acquisition policy
C. A right to audit clause in vendor contracts and SOWs
D. An in-depth penetration test of all suppliers and vendors
Explanation:
A) A thorough analysis of the supply chain is the correct answer.
Counterfeit hardware often enters networks through complex and opaque supply chains. By conducting a thorough supply chain analysis, the company can:
Identify and vet suppliers and distributors to ensure they are authorized and reputable.
Trace the origin of hardware components to verify authenticity.
Assess risks at each stage of the supply chain (e.g., manufacturing, shipping, storage) to prevent tampering or substitution.
Implement controls such as sourcing directly from certified vendors or using serial number verification.
This proactive approach addresses the root cause of counterfeit hardware risks by ensuring transparency and integrity throughout the procurement process.
Why the others are incorrect:
B) A legally enforceable corporate acquisition policy:
While a policy can set rules for procurement, it does not inherently prevent counterfeit hardware from entering the supply chain. Policies must be enforced with practical measures (like supply chain analysis) to be effective.
C) A right to audit clause in vendor contracts and SOWs:
This allows the company to audit vendors for compliance, but it is a reactive measure. It may help detect counterfeits after they are procured rather than preventing them upfront.
D) An in-depth penetration test of all suppliers and vendors:
Penetration tests assess technical vulnerabilities in systems, not the physical authenticity of hardware. This is unrelated to verifying whether hardware is genuine or counterfeit.
Reference:
This question tests knowledge of Domain 5.2: Explain the elements of the risk management process and Domain 5.3: Explain the importance of policies to organizational security. Supply chain risk management is a critical component of overall security strategy, especially for hardware procurement. The SY0-701 objectives emphasize the importance of assessing and mitigating risks throughout the supply chain to prevent issues like counterfeiting, which can compromise network integrity and security.
A user would like to install software and features that are not available with a smartphone's default software. Which of the following would allow the user to install unauthorized software and enable new features?
A. SOU
B. Cross-site scripting
C. Jailbreaking
D. Side loading
Explanation:
Jailbreaking (on iOS devices) or rooting (on Android devices) is the process of removing software restrictions imposed by the operating system manufacturer. This gives the user elevated privileges (root access) to modify the OS kernel, install unauthorized software from third-party sources, and enable features that are otherwise blocked by the default software. This directly allows the user to install software and features not available by default.
Why the others are incorrect:
A. SOU:
This is not a standard term in mobile device security. It may be a distractor or misspelling (e.g., possibly confused with "SU" for superuser, but it is not a recognized acronym for this context).
B. Cross-site scripting (XSS):
This is a web application vulnerability where attackers inject malicious scripts into legitimate websites. It is unrelated to installing software on a mobile device.
D. Side loading:
This refers to installing applications from sources other than the official app store (e.g., downloading an APK file from a website). While side loading can allow unauthorized software installation, it does not necessarily require jailbreaking/rooting (e.g., Android allows side loading if the user enables "Unknown sources"). However, jailbreaking/rooting is the more comprehensive answer because it not only enables side loading but also grants deep system access to modify the OS and unlock new features beyond just app installation.
Reference:
This aligns with SY0-701 Objective 3.5 ("Given a scenario, implement policies for mobile devices"). Jailbreaking is explicitly highlighted as a security risk because it bypasses built-in protections, violates BYOD/COPE policies, and exposes the device to malware. It is the primary method for gaining full control to install unauthorized software and features.
An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?
A. ACL
B. DLP
C. IDS
D. IPS
Explanation:
The scenario describes attacks that exploit known vulnerabilities in older browsers using well-known exploits. This indicates the attacks have identifiable patterns or signatures. The requirement is to both monitor and block these attacks.
D. IPS (Intrusion Prevention System) (Correct):
An IPS is a network security tool that is designed to actively monitor network traffic for known attack signatures and patterns of malicious behavior. Most importantly, it can take automated action to block the malicious traffic in real-time, preventing the exploit from reaching the target. This directly meets the requirement to both monitor and block these known signature-based attacks.
Why the other options are incorrect:
A. ACL (Access Control List) (Incorrect):
An ACL is a set of rules used to control network traffic by allowing or denying traffic based on source/destination IP addresses, ports, and protocols. It is a basic filtering tool that operates at the network layer. It is not designed to inspect the content of traffic for specific exploit signatures within allowed protocols (like HTTP/HTTPS web traffic from browsers).
B. DLP (Data Loss Prevention) (Incorrect):
DLP is focused on preventing the exfiltration of sensitive data. It monitors content to ensure confidential information isn't being sent outside the network. It is not designed to detect or block incoming exploit attempts targeting browser vulnerabilities.
C. IDS (Intrusion Detection System) (Incorrect):
An IDS is very similar to an IPS in that it monitors network traffic for known attack signatures and patterns. However, the critical difference is that an IDS is a passive monitoring tool. It can detect and alert on malicious activity, but it cannot block it. The question specifically asks for a solution that can both monitor and block, making the IPS the correct choice.
Reference:
This question falls under Domain 4.0: Security Operations, specifically covering the capabilities of security tools like IDS and IPS. Understanding the difference between detection (IDS) and prevention (IPS) is a key exam objective. The scenario describes a classic use case for a signature-based IPS.
A company hired a security manager from outside the organization to lead security operations. Which of the following actions should the security manager perform first in this new role?
A. Establish a security baseline.
B. Review security policies.
C. Adopt security benchmarks.
D. Perform a user ID revalidation.
Explanation: When a security manager is hired from outside the organization to lead security operations, the first action should be to review the existing security policies.
Understanding the current security policies provides a foundation for identifying strengths, weaknesses, and areas that require improvement, ensuring that the security program aligns with the organization's goals and regulatory requirements.
Review security policies: Provides a comprehensive understanding of the existing security framework, helping the new manager to identify gaps and areas for enhancement. Establish a security baseline: Important but should be based on a thorough understanding of existing policies and practices.
Adopt security benchmarks: Useful for setting standards, but reviewing current policies is a necessary precursor.
Perform a user ID revalidation: Important for ensuring user access is appropriate but not the first step in understanding overall security operations.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 5.1 - Summarize elements of effective security governance (Reviewing security policies).
Which of the following describes effective change management procedures?
A. Approving the change after a successful deployment
B. Having a backout plan when a patch fails
C. Using a spreadsheet for tracking changes
D. Using an automatic change control bypass for security updates
Explanation: Effective change management procedures include having a backout plan when a patch fails. A backout plan ensures that there are predefined steps to revert the system to its previous state if the new change or patch causes issues, thereby minimizing downtime and mitigating potential negative impacts.
Having a backout plan when a patch fails: Essential for ensuring that changes can be safely reverted in case of problems, maintaining system stability and availability.
Approving the change after a successful deployment: Changes should be approved before deployment, not after.
Using a spreadsheet for tracking changes: While useful for documentation, it is not a comprehensive change management procedure. Using an automatic change control bypass for security updates: Bypassing change control can lead to unapproved and potentially disruptive changes.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 1.3 - Explain the importance of change management processes (Backout plan).
A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?
A. Insurance
B. Patching
C. Segmentation
D. Replacement
Explanation:
Segmentation is the best option to quickly mitigate the vulnerability. By placing the legacy IoT devices in a isolated network segment (e.g., using VLANs or firewalls), you can restrict their communication to only necessary services and systems. This limits the attack surface and prevents potential exploits from spreading to other parts of the network, even if the devices themselves remain unpatched.
Why the other options are incorrect:
A. Insurance:
Cybersecurity insurance helps financially mitigate the impact of an incident after it occurs, but it does not technically prevent or reduce the vulnerability itself. It is a risk transfer mechanism, not a security control.
B. Patching:
While patching is ideal, the scenario specifies "legacy IoT devices." Legacy devices often cannot be patched because they may no longer be supported by the manufacturer, or patching could disrupt their functionality. Even if patches are available, deploying them across many IoT devices may not be "quick."
D. Replacement:
Replacing the devices with modern, secure ones is a long-term solution but is not quick or cost-effective. It requires procurement, configuration, and deployment time, which does not address the immediate need for mitigation.
Reference:
This question tests knowledge of vulnerability mitigation strategies, especially for challenging environments like IoT.
This falls under Domain 3.3: Given a scenario, apply security techniques to a cloud environment (IoT often connects to cloud services) and Domain 4.2: Explain the importance of and perform vulnerability management activities of the CompTIA Security+ SY0-701 exam objectives.
Network segmentation is a recommended practice for securing IoT devices in frameworks like NIST SP 800-213 (IoT Device Cybersecurity Guidance) and the CIS Critical Security Controls. It provides immediate risk reduction when other fixes are not feasible.
A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).
A. Key escrow
B. TPM presence
C. Digital signatures
D. Data tokenization
E. Public key management
F. Certificate authority linking
Explanation:
Implementing Full Disk Encryption (FDE) requires careful planning to ensure data is protected but also remains accessible to the organization. The two most critical factors to consider are:
A. Key Escrow:
This is the practice of storing a copy of the encryption keys (or recovery keys) in a secure, centralized location managed by the organization. This is absolutely essential. If a user forgets their password, leaves the company, or is unavailable, the organization must have a way to recover the encrypted data to maintain business operations. Without key escrow, the data on the laptop could be permanently lost.
B. TPM Presence:
A Trusted Platform Module (TPM) is a hardware chip on a computer's motherboard that securely stores encryption keys. Using a TPM is a standard and highly secure method for managing FDE (e.g., with BitLocker or FileVault). It allows the disk to unlock seamlessly when the user logs in without requiring them to enter a long recovery key, while also protecting the keys from software-based attacks. The engineer must verify that all laptops have a TPM or have a plan for laptops that do not (which would require a less secure software-only encryption method).
Why the other options are incorrect:
C. Digital Signatures:
These are used for verifying authenticity, integrity, and non-repudiation of messages or software. They are not involved in the symmetric encryption process used by FDE.
D. Data Tokenization:
This is the process of replacing sensitive data with a non-sensitive equivalent (a token) that has no exploitable value. It is used to protect specific data fields, not to encrypt an entire disk.
E. Public Key Management & F. Certificate Authority Linking:
These are elements of asymmetric cryptography (Public Key Infrastructure - PKI), which is used for functions like secure email, digital signatures, and website encryption (HTTPS). FDE primarily uses symmetric cryptography (like AES) for performance reasons. While some enterprise FDE solutions can integrate with PKI for pre-boot authentication, it is not a universal requirement. The management of the FDE's symmetric keys (via escrow and TPM) is far more fundamental.
Reference:
This topic covers the practical implementation of cryptography.
It falls under Domain 2.2: Implement cryptography for security purposes and Domain 3.4: Explain the importance of physical security controls (as TPM is a hardware-based security control) of the CompTIA Security+ SY0-701 exam objectives.
Key management and recovery are critical concepts in the NIST Cybersecurity Framework and other standards, emphasizing that security controls must not render data irrecoverable to the organization.
Page 5 out of 60 Pages |
Previous |