IT CertificationsComprehensive Study Set

Comptia Sec Plus Objectives

595 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Phishing

ANSWER

Fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

QUESTION 2

Smishing

ANSWER

When someone tries to trick you into giving them your private information via a text or SMS message.

QUESTION 3

Vishing

ANSWER

Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward

QUESTION 4

Spam

ANSWER

Irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware

QUESTION 5

SPIM

ANSWER

Spam delivered through instant messaging (IM) instead of through e-mail messaging

QUESTION 6

Spear Phishing

ANSWER

The act of sending emails to specific and well-researched targets while pretending to be a trusted sender

QUESTION 7

Dumpster Diving

ANSWER

Exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.

QUESTION 8

Shoulder Surfing

ANSWER

When someone watches over your shoulder to nab valuable information as you key it into an electronic device.

QUESTION 9

Pharming

ANSWER

Cyberattack intended to redirect a website's traffic to another, fake site.

QUESTION 10

Tailgating

ANSWER

Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.

QUESTION 11

Eliciting Information

ANSWER

Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform

QUESTION 12

Whaling

ANSWER

Spear phishing that focuses on one specific high level executive or influencer

QUESTION 13

Prepending

ANSWER

Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.

QUESTION 14

Identity Fraud

ANSWER

Identity fraud is the use of stolen information such as making fake ID's and fake bank accounts

QUESTION 15

Invoice Scams

ANSWER

Using fraudulent invoices to steal from a company

QUESTION 16

Credential Harvesting

ANSWER

The use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.

QUESTION 17

Reconnaissance

ANSWER

Information gathering about a target network

QUESTION 18

Hoax

ANSWER

Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.

QUESTION 19

Impersonation

ANSWER

Typically involves an email that seems to come from a trusted source.

QUESTION 20

Watering hole attack

ANSWER

Security exploit in which the attacker seeks to compromise a specific group of end-users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.

QUESTION 21

Typo squatting

ANSWER

Type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system facebook.com faceboook.com

QUESTION 22

Pretexting

ANSWER

The practice of presenting oneself as someone else in order to obtain private information.

QUESTION 23

Influence campaigns

ANSWER

Sway public opinion on political and social issues. Example, using fake accounts to sway legitimate accounts

QUESTION 24

Hybrid warfare

ANSWER

Wage war non-traditionally - with cyberwarfare/influencing foreign elections

QUESTION 25

Social Media Campaign

ANSWER

Planned, coordinated marketing efforts using one or more social media platforms.

QUESTION 26

Principles:

ANSWER

Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.

QUESTION 27

Malware

ANSWER

A program or file designed to be disruptive, invasive, and harmful to your computer.

QUESTION 28

Ransomware

ANSWER

Software that encrypts programs and data until a ransom is paid to remove it.

QUESTION 29

Worms

ANSWER

Independent computer programs that copy themselves from one computer to other computers over a network.

QUESTION 30

Potentially Unwanted Program (PUP)

ANSWER

Program that installs itself on a computer, typically without the user's informed consent

QUESTION 31

Fileless virus

ANSWER

Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

QUESTION 32

Command and Control

ANSWER

A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network

QUESTION 33

Bots

ANSWER

self-propagating malware that infects its host and connects back to a central server(s).

QUESTION 34

Cryptomalware

ANSWER

Malware to remain in place for as long as possible, quietly mining in the background.

QUESTION 35

Logic Bomb

ANSWER

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

QUESTION 36

Spyware

ANSWER

Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.

QUESTION 37

Keyloggers

ANSWER

software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

QUESTION 38

Remote Access Trojan

ANSWER

Type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.

QUESTION 39

Rootkit

ANSWER

software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine

QUESTION 40

Backdoor

ANSWER

refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.

QUESTION 41

Password Attack

ANSWER

Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

QUESTION 42

Spraying password attack

ANSWER

Try a few passwords and move on before account lockout

QUESTION 43

Dictionary password attack

ANSWER

An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.

QUESTION 44

Brute Force Password Attack (offline and online)

ANSWER

An attempt to guess a password by attempting every possible combination of characters and numbers in it. Offline is faster because you don't have to wait for server response.

QUESTION 45

Rainbow Tables

ANSWER

An attack on a password that uses a large prebuilt data set of hashes. Compares the password to the hash table.

QUESTION 46

Plaintext/unencrypted password

ANSWER

No encryption of stored passwords

QUESTION 47

Malicious universal serial bus (USB) cable

ANSWER

Identifies as a Human Interface Device (HID) bypasses the need for rights/permission.

QUESTION 48

Malicious flash drive

ANSWER

Has malicious file or have operate as a HID. Rubber Ducky USB is an example.

QUESTION 49

Card cloning

ANSWER

Get card details from a skimmer and create a duplicate card. Magnetic stripe is clone but the chip can not

QUESTION 50

Skimming

ANSWER

Stealing credit card information

QUESTION 51

Adversarial artificial intelligence (AI)

ANSWER

1. Tainted training for machine learning (ML) 2. Security of machine learning algorithms

QUESTION 52

Supply-chain attacks

ANSWER

Attack on a trusted source that works closely with the target that will bypass security measures

QUESTION 53

Cloud-based vs. on-premises attacks

ANSWER

Cloud: Offsite, usually managed by third party, lower cost, no data centers, limited downtime On-premises attack: On-site, full control of data, system check can occur at anytime, high cost and time consumption

QUESTION 54

Cryptographic attacks

ANSWER

1. Birthday attack: Hash collision - same hash value for two different plaintext 2. Collision: Different input should never create the same hash 3. Downgrade: Instead of using a good encryption, it is downgraded to something not secured

QUESTION 55

Privilege escalation

ANSWER

Exploiting a vulnerability in software to gain access to resources that the user would normally be restricted from obtaining.

QUESTION 56

Cross-site scripting

ANSWER

Code injected by malicious web users into web pages viewed by other users.

QUESTION 57

Injections

ANSWER

Adding your own information into a data stream.

QUESTION 58

Structured query language (SQL) Injection

ANSWER

Calling SQL commands that return outside the intended information

QUESTION 59

Extensible markup language (XML) Injection

ANSWER

A set of rules for data transfer and storage. Modifying XML requests

QUESTION 60

Lightweight directory access protocol (LDAP) Injection

ANSWER

Used by almost everyone. Modify LDAP requests to manipulate application results

QUESTION 61

Dynamic link library (DDL) Injection

ANSWER

A Windows library containing code and data that another application will use. When an application calls the DLL, it will create a new thread under itself running malicious code

QUESTION 62

Buffer overflows

ANSWER

Spill information into other areas of memory

QUESTION 63

Replay attack (session replays)

ANSWER

Useful information that is transmitted over the network is intercepted and replayed to appear as someone else. Not an on-path attack because doesn't require the original workstation.

QUESTION 64

Request forgeries

ANSWER

1. Server-side 2. Cross-site

QUESTION 65

Pointer/object dereference

ANSWER

Memory pointed to a null part of memory that can cause a DOS attack or show debug error to attacker

QUESTION 66

Directory traversal

ANSWER

Read files from a web server that are outside the website's file directory

QUESTION 67

Race conditions(Time of check/time of use)

ANSWER

An undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time

QUESTION 68

Error handling

ANSWER

Giving too much information during an error

QUESTION 69

Improper input handling

ANSWER

Validation doesn't occur on input, a hacker can inject malicious data into the application

QUESTION 70

Integer overflow

ANSWER

Vulnerabilities in the application's commination path. Example - sensitive data, DoS, privileged access

QUESTION 71

Application programming interface (API) attacks

ANSWER

Specialized DoS that may only require one device Example - ZIP bomb

QUESTION 72

Resource exhaustion

ANSWER

Unused memory not properly releassed

QUESTION 73

Memory leak

ANSWER

Combination of on-path attack with a downgrade attack Example - HTTP downgrade

QUESTION 74

Secure sockets layer (SSL) stripping

ANSWER

Interaction between hardware and OS which is often trusted

QUESTION 75

Driver manipulation

ANSWER

Filling in the space between two objects Example - Window's backwards compatibility mode

QUESTION 76

Shimming

ANSWER

Metamorphic malware - different program each time it is downloaded to avoid the same signatures for anti-virus that check for it

QUESTION 77

Refactoring

ANSWER

capture of a password's hash, instead of plain text password

QUESTION 78

Pass the hash

ANSWER

Wifi that looks legitimate but actually malicious

QUESTION 79

Wireless Evil Twin

ANSWER

Unauthorized wireless access point that could become a potential backdoor Prevented by using 802.1X (Network Access Control) so that you must authenticate regardless of connection type

QUESTION 80

Rogue access point

ANSWER

Attacker access valuable data via bluetooth device - High security issue

QUESTION 81

Bluesnarfing

ANSWER

Sending of unsolicited messages to another device via Bluetooth - Low security issue

QUESTION 82

Bluejacking

ANSWER

Constantly connect/disconnect of wireless connection Requires old versions of 802.11 to DOS you

QUESTION 83

Wireless Disassociation Attack

ANSWER

DOS by spamming junk data

QUESTION 84

Jamming

ANSWER

Wireless data via radio frequencies that can be exposed to any wifi attacks

QUESTION 85

Radio frequency identifier (RFID)

ANSWER

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

QUESTION 86

Near Field Communication (NFC)

ANSWER

A 24-bit value used in WEP that changes each time a packet is encrypted.

QUESTION 87

Initialization Vector (IV)

ANSWER

Redirects your traffic and takes information along the way

QUESTION 88

On-path attack(Man-in-the-middle)

ANSWER

Attacker is on local network that send a message to override the ARP cache so that messages are sent to the attacker and forwarded to the dest

QUESTION 89

Layer 2 attacks

ANSWER

Attacker starts sending traffic with different source MAC addresses - forcing out the legitimates MAC addresses There is a limit on a MAC address table so now the switch will start sending traffic to all interfaces

QUESTION 90

Address resolution protocol (ARP) poisoning

ANSWER

Bypass MAC filters or DOS

QUESTION 91

Media access control (MAC) flooding

ANSWER

A hierarchical system for naming resources on the Internet.

QUESTION 92

MAC Cloning

ANSWER

Get access to the domain registration account

QUESTION 93

Domain Name System (DNS)

ANSWER

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing. How - modify the host file on client's device - man in the middle - alter the DNS record on the server to resolve to another IP address

QUESTION 94

Domain hijacking

ANSWER

Similar named websites

QUESTION 95

DNS poisoning

ANSWER

The Internet is tracking your security posture. So that the more people click spam of an email, the more your company mail is considered spam. Same with URLs

QUESTION 96

Uniform Resource Locator (URL) redirection

ANSWER

An attack that uses many computers to perform a DoS attack.

QUESTION 97

Domain reputation

ANSWER

Normal definition of DDOS

QUESTION 98

Distributed Denial of Service (DDoS)

ANSWER

Break or make application work harder

QUESTION 99

DDOS network

ANSWER

The hardware and software for industrial equipment

QUESTION 100

DDOS application

ANSWER

Windows command line .ps1 file extension

QUESTION 101

DDOS operational technology

ANSWER

General purpose scripting language

QUESTION 102

Malicious code or script execution

ANSWER

Linux/Unix shell and command language

QUESTION 103

Powershell

ANSWER

Automate functions within an APPLICATON

QUESTION 104

Python

ANSWER

programming language you can use to create macros

QUESTION 105

Bash

ANSWER

Attacker in the network and undetected over a period of time

QUESTION 106

Macros

ANSWER

Current or former employee, contractor or other partner that has or had authorized access and intentionally misused that access

QUESTION 107

Visual Basic for Applications (VBA)

ANSWER

Government

QUESTION 108

Advanced Persistent Threat (APT)

ANSWER

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

QUESTION 109

Insider threats

ANSWER

Runs pre-made scripts without any knowledge of what's really happening

QUESTION 110

State actors

ANSWER

Professional criminals motivated by money

QUESTION 111

Hacktivists

ANSWER

Ethical hacker

QUESTION 112

Script kiddies

ANSWER

Malicious hacker

QUESTION 113

Criminal syndicates

ANSWER

Finds a vulnerability but doesn't use it

QUESTION 114

Authorized Hackers

ANSWER

Going rogue, working around the internal IT team

QUESTION 115

Unauthorized hackers

ANSWER

Competitor

QUESTION 116

Semi-authorized hackers

ANSWER

APTs, and nation states have a penchant for long-term attacks, which requires this which only major organizations or government can manage over time.

QUESTION 117

Shadow IT

ANSWER

This can be simple or multifold in nature. A script kiddie is just trying to make a technique work. A more skilled threat actor is usually pursuing a specific objective, such as trying to make a point as a hacktivist. At the top of the intent pyramid is the APT threat actor, whose intent or motivation is at least threefold.

QUESTION 118

Competitors

ANSWER

Physical access - Attach keylogger - Transfer files - Destroy data center - Change admin password

QUESTION 119

Internal/external actors

ANSWER

- Default login credentials - Rogue access point - Evil twin - Protocol vulnerabilities

QUESTION 120

Level of sophistication/capability in actors

ANSWER

- Phishing attacks - Deliver malware - Social engineering attacks

QUESTION 121

Resources/funding (attributes of actors)

ANSWER

Tamper with the underlying infrastructure/manufacturing process - Gain access to a network using a vendor - Malware can modify the manufacturing process - Counterfeit networking equipment

QUESTION 122

Intent/motivation (attributes of actors)

ANSWER

Information from your social media accounts

QUESTION 123

Vectors direct access

ANSWER

Get around firewall via removable medias (USB) - Malicious software on USB flash drives - USB device acts as keyboard - Data exfiltration - take data and walk out

QUESTION 124

Wireless Vectors

ANSWER

Public-facing applications and services

QUESTION 125

Vector Email

ANSWER

Research the threats

QUESTION 126

Vector Supply Chain

ANSWER

Open-source information Information from internet, media (newspapers, television), public government reports, professional and academic publications, and other openly available.

QUESTION 127

Vector Social Media

ANSWER

Someone else has already compiled the threat information and sell it

QUESTION 128

Vector Removable Media

ANSWER

Researchers find vulnerabilities - Common Vulnerabilities and Exposures (CVE) - U.S. National Vulnerability Database (NVD)

QUESTION 129

Vector Cloud

ANSWER

Public threat intelligence - government Private threat intelligence - private companies

QUESTION 130

Threat intelligence sources

ANSWER

- unusual outbound traffic - anomalies in privileged account - geographic irregularities - login failures - swells in database read volume - large html responses - many requests for one file - mismatched port-applications - suspicious registry changes - spikes in dns requests from one host - weird login times

QUESTION 131

Open-Source Intelligence (OSINT)

ANSWER

System that enables the sharing of attack indicators between the US government and the private sector as soon as the treat is verified

QUESTION 132

Closed/proprietary threat intelligence source

ANSWER

- describes cyber threat information - includes motivations, abilities, capabilities and response information

QUESTION 133

Vulnerability databases

ANSWER

- Securely shares STIX data between organizations

QUESTION 134

Public/private information-sharing centers

ANSWER

Analyze large amounts of data very quickly - identify behaviors from data - create a forecast for potential attacks - less emphasis on signature by using machine learning

QUESTION 135

Dark Web

ANSWER

Identify attacks and trends

QUESTION 136

Indicators of compromise

ANSWER

See what hackers are building

QUESTION 137

Automated Indicator Sharing (AIS)

ANSWER

Vendors wrote the software

QUESTION 138

Structured Threat Information eXpression (STIX)

ANSWER

Automated vulnerability notifications

QUESTION 139

Trusted Automated eXchange of Indicator Information (TAXII)

ANSWER

Watch and learn from researchers/people who done things

QUESTION 140

Predictive analysis

ANSWER

Research from academic professionals, extreme writeups

QUESTION 141

Threat maps

ANSWER

A document published by the Internet Society and written by Internet Engineering Task Force (IETF) that details information about standardized Internet protocols and those in various development stages.

QUESTION 142

File/code repositories

ANSWER

Gathering of local peers

QUESTION 143

Vendor websites

ANSWER

Hacking group conversations

QUESTION 144

Vulnerability feeds

ANSWER

Monitor threat announcements - US Department of Homeland Security

QUESTION 145

Conferences

ANSWER

Understand the methods attackers are using - Different types of TTPs apply to different entities

QUESTION 146

Academic journals

ANSWER

Vulnerabilities that has not been detected or published.

QUESTION 147

Request for Comments (RFC)

ANSWER

- Open permissions - Unsecure root accounts - Errors - Weak encryption - Unsecure protocols - Default settings - Open ports and services

QUESTION 148

Local industry groups

ANSWER

Information that has been exposed without security

QUESTION 149

Social media research source

ANSWER

Message can provide information to attacker

QUESTION 150

Threat feed research source

ANSWER

Non-encrypted protocols

QUESTION 151

Adversary tactics, techniques, and procedures (TTP)

ANSWER

Every application and network device has a default login

QUESTION 152

Cloud-based vs. on-premises vulnerabilities

ANSWER

Services will open ports, managed by a firewall

QUESTION 153

Zero-day

ANSWER

Expect the worst

QUESTION 154

Weak configurations

ANSWER

1. System integration - TP can do things on the inside 2. Lack of vendor support - they need to care

QUESTION 155

Open permissions - Weak configurations

ANSWER

can't control security from third parties. Their software might be infected

QUESTION 156

Unsecure root accounts - Weak configurations

ANSWER

Must secure the environment for code development - Use VPN - Isolate the system away from the rest of the network - Check for backdoors

QUESTION 157

Errors - Weak configurations

ANSWER

- Store in encrypted form - Transfer via encryption

QUESTION 158

Weak encryption - Weak configurations

ANSWER

Firmware: Operating system: Applications:

QUESTION 159

Unsecure protocols - Weak configurations

ANSWER

Old old old things

QUESTION 160

Default setting - Weak configurations

ANSWER

- Unsecured database could be deleted

QUESTION 161

Open ports and services - Weak configurations

ANSWER

Use for self gaining purposes

QUESTION 162

Third-party risks

ANSWER

rip money

QUESTION 163

Vendor management

ANSWER

rip public relations

QUESTION 164

Third-party risks in supply chain

ANSWER

lost of time and availability

QUESTION 165

Third-party risks in outsourced code development

ANSWER

Find the attacker before they find you. Intelligence data is reactive.

QUESTION 166

Third-party risks in data storage

ANSWER

An overwhelming amount of security data or Separate teams. Too much to detect, analyze, and react.

QUESTION 167

Improper or weak patch management

ANSWER

Move the troops. Set a firewall rule, block IP address, delete malicious software.

QUESTION 168

Legacy platforms

ANSWER

Not penetration test, trying to determine if there is a potential to gain access. - Port scan - Identify systems (servers, workstations, laptops) - Test from outside/inside

QUESTION 169

Impacts of data loss

ANSWER

Vulnerability doesn't exist - Different from low severity vulnerability, because a FP doesn't exist

QUESTION 170

Impacts of data breaches

ANSWER

Vulnerability exist, but you didn't detect it

QUESTION 171

Impacts of data exfiltration

ANSWER

Lack of security controls - No firewall - No anti-virus - No anti-spyware Misconfigurations - Open shares - Guest access Real vulnerabilities - Show new ones - Sometimes old ones

QUESTION 172

Impacts of identity theft

ANSWER

Credentialed - inside attack (normal user) Non-credentialed - the scanner can't login to the remote device (from random from internet)

QUESTION 173

Impacts of financial

ANSWER

Intrusive - try out the vulnerability and see if it works Non-intrusive - gather information, don't try to exploit a vulnerability

QUESTION 174

Impacts of reputation

ANSWER

Desktop/mobile apps

QUESTION 175

Impacts of availability loss

ANSWER

Software on webserver

QUESTION 176

Threat hunting

ANSWER

The application of vulnerability scanning to network devices to search for vulnerabilities at the network level. - Misconfigured firewalls - Open ports

QUESTION 177

Intelligence fusion

ANSWER

0 to 10

QUESTION 178

Threat feeds

ANSWER

Validate the security of device configurations - account configurations, local device settings - firewall rules, authentication options

QUESTION 179

Advisories and bulletins

ANSWER

Logging of security events and information Syslog - standard for message logging. Requires terabytes of storage for this data

QUESTION 180

Maneuver

ANSWER

- Network packets

QUESTION 181

Vulnerability scans

ANSWER

- Server authentication attempts - VPN connections - Firewall session logs - Denied outbound traffic flows - Network utilizations

QUESTION 182

False positives

ANSWER

- Detect insider threats - Identify targeted attacks - Catches what the SIEM and DLP systems might miss

QUESTION 183

False negatives

ANSWER

How the public views the organization - if they hate you, they hack you

QUESTION 184

Log reviews

ANSWER

Important metrics in the incoming logs - Tracks, informs, reacts to logs

QUESTION 185

credentialed vs. non-credentialed (vulnerability scanning)

ANSWER

Usually includes advanced reporting features

QUESTION 186

Intrusive vs. non-intrusive (scans)

ANSWER

Real-time information

QUESTION 187

Application - vulnerability scanner

ANSWER

- Automate routine, tedious, and time-intensive activities - Connect many different tools together (Firewalls, account management, email filters)

QUESTION 188

Web application -vulnerability scan

ANSWER

Given information

QUESTION 189

Network - vulnerability scanner

ANSWER

No information

QUESTION 190

Common Vulnerabilities and Exposures (CVE)

ANSWER

Mix information

QUESTION 191

Common Vulnerability Scoring System (CVSS)

ANSWER

An important documents - Defines purpose and scope - IP address ranges - Emergency contacts - How to handle sensitive information

QUESTION 192

Configuration review - vulnerability scan

ANSWER

Move from system to system (inside)

QUESTION 193

Syslog/security information and event management (SIEM)

ANSWER

Once you're there, you need to make sure there's a way back in - Setup backdoor

QUESTION 194

Review reports

ANSWER

Leave the network in its original state

QUESTION 195

Packet capture

ANSWER

Reward

QUESTION 196

Data inputs

ANSWER

Gain access to systems that would normally not be accessible

QUESTION 197

User behavior analysis

ANSWER

Passive - Learn as much as you can from open sources Active - Trying the doors, actively send information into the network looking for holes.

QUESTION 198

Sentiment analysis

ANSWER

Combine WiFi monitoring and a GPS (Search from your plane or drone)

QUESTION 199

Security monitoring

ANSWER

Combine WiFi monitoring and a GPS (Search from your car)

QUESTION 200

Log aggregation

ANSWER

Open Source Intelligence, is the practice of collecting information from published or otherwise publicly available sources.

QUESTION 201

Log Collectors

ANSWER

Red-Team: Hired attackers Blue-Team: Protecting Data White-Team: Manages the red and blue team (referees/managers) Purple-Team: Working together share information with each other

QUESTION 202

Security orchestration, automation, and response (SOAR)

ANSWER

The only constant is change

QUESTION 203

Known environment

ANSWER

Layout of network

QUESTION 204

Unknown Environment

ANSWER

The security of an application environment should be well defined - (Firewall settings, patch levels, OS file versions)

QUESTION 205

Partially known environment

ANSWER

Create a standard to be understood by everyone

QUESTION 206

Rules of engagement

ANSWER

An IP address plan or model

QUESTION 207

Lateral movement

ANSWER

Data that resides in a country is subject to the laws of that country - EU citizen data must be stored in EU

QUESTION 208

Persistence (Penetration testing)

ANSWER

A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users.

QUESTION 209

Cleanup (Penetration testing)

ANSWER

Hide some of the original data

QUESTION 210

Bug bounty (Penetration testing)

ANSWER

Encode information into unreadable data - Confusion - encrypted data is drastically diff than plain. - Able to convert back and front if you have a key

QUESTION 211

Pivoting (Penetration Testing)

ANSWER

Data on a storage device

QUESTION 212

Passive and active reconnaissance

ANSWER

Data in transit over the network - TLS - IPsec

QUESTION 213

Drones (reconnaissance)

ANSWER

Data is actively processing in memory - Data is almost always decrypted - Take data out of the RAM

QUESTION 214

War flying

ANSWER

Replace sensitive data with a non-sensitive placeholder - Credit card number one time use - Not encryption

QUESTION 215

War driving

ANSWER

Control how data is used Restrict data access to unauthorized persons

QUESTION 216

Footprinting

ANSWER

Legal implications

QUESTION 217

OSINT

ANSWER

Identify the attack, limit the impact of the attacker - Limit data exfiltration - Limit access to sensitive data

QUESTION 218

Exercise types

ANSWER

Encryption of data for transport layer - SSL/TLS relies on trust via certificates, sign by a third party

QUESTION 219

Configuration management

ANSWER

transforming plaintext of any length into a short code called a hash

QUESTION 220

Diagrams - Configuration management

ANSWER

Application Programming Interface - On-path attack - intercept and modify API messages - API injection - inject data into an API message - DDoS - one bad API call can bring down a system

QUESTION 221

Baseline configuration

ANSWER

Recovery site is prepped - data is synchronized

QUESTION 222

Standard naming conventions

ANSWER

An exact replica of the main site

QUESTION 223

Internet protocol (IP) schema

ANSWER

No hardware/data/people - empty building

QUESTION 224

Data sovereignty

ANSWER

Between hot and cold - big room and hardware is ready and waiting

QUESTION 225

Data protection

ANSWER

Attract the bad guys, trap them here

QUESTION 226

Data loss prevention (DLP)

ANSWER

Bait for the honeynet - (password.txt) - Alert is sent if the file is accessed

QUESTION 227

Data Masking

ANSWER

Multiple honeypots

QUESTION 228

Encryption in data protection

ANSWER

Machine learning - interpret big data to identify the invisible - Learn how malware looks and act - Stop malware based on actions instead of signatures

QUESTION 229

Data protection: at rest

ANSWER

A DNA that hands out incorrect IP address - Can be bad - redirect users to a malicious site - Can be good - redirect known malicious domains to a benign IP address

QUESTION 230

Data protection: In transit/motion

ANSWER

Fog - A cloud that's close to your data. Cloud -> Fog -> IoT - A distributed cloud architecture.

QUESTION 231

Data protection: In processing

ANSWER

The location of relatively small servers close to the end users to save resources in terms of network bandwidth and provide improved responsiveness. No server needed, bc user's machine will compute everything. So many positives for the user.

QUESTION 232

Data protection: Tokenization

ANSWER

Instead of full computer, it is a smaller application with enough computing power to connect to the cloud. - See what's happening in the cloud via computer

QUESTION 233

Data protection: Rights management

ANSWER

Contains everything you need to run an application. You can multiple containers under an OS and each container is isolated from other containers. Virtualized vs. Containerized - Multiple OS vs Single OS

QUESTION 234

Geographical considerations

ANSWER

Monolithic applications - one big application that does everything Microservices - specialized section of the monolithic application Client <- API Gateway <- microservices <- databases

QUESTION 235

Response and recovery controls

ANSWER

Using a central control program separate from network devices to manage the flow of data on a network. - Connect a bunch of webservers and database via an internal firewall

QUESTION 236

Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection

ANSWER

You must see the traffic to secure the data.

QUESTION 237

Hashing

ANSWER

FaaS - Function as a Service -application are separated into individual autonomous functions. Remove the OS from the equation Developer runs a stateless compute container. Handles API request. Create containers if needed.

QUESTION 238

API considerations

ANSWER

Service integration and Management (SIAM) - single place for all services

QUESTION 239

Site resiliency

ANSWER

Assigning permissions to cloud resources. - Specific region, deny others - IP ranges, deny others - Allow users, deny others

QUESTION 240

Hot site

ANSWER

Virtual Private Cloud (VPC) - private information stored created in public cloud Transit Gateway - connects VPC with TG - allows access to all the VPC

QUESTION 241

Cold Site

ANSWER

Run many different operating systems on the same hardware

QUESTION 242

Warm site

ANSWER

Click a button - you've just built a server or multiple servers. You can easily confuse what each virtual object is used for so keep documentation.

QUESTION 243

Deception and disruption

ANSWER

Escape VM and take over host.

QUESTION 244

Honeypots

ANSWER

Commission/Decommission of assets from the time it is installed, until the time it is decommissioned and disposed. Create things when they are needed

QUESTION 245

Honeyfiles

ANSWER

Techniques used while coding to provide as much security as possible.

QUESTION 246

Honeynets

ANSWER

Instead client calling a SQL command, the client will request the command from the database itself. - Old days, client requests SELECT * FROM table but they could modify it for bad doings. - Now, client requests CALL items and that's it no modifications possible. Only a list of commands to chose from

QUESTION 247

Fake telemetry

ANSWER

Making code hard to read by normal people.

QUESTION 248

DNS Sinkhole

ANSWER

Copy and pasta. - If that old code has security issue then rip. - Some code can be Dead Code which is computed but not used.

QUESTION 249

Cloud models

ANSWER

Validation - never trust user input Server-side validation - all checks occur on the server, safer but slower Client-side validation - all checks on the client side Use both

QUESTION 250

Infrastructure as a Service (IaaS)

ANSWER

Be mindful of how memory is used

QUESTION 251

Platform as a Service (PaaS)

ANSWER

Speed up development Potential security risk

QUESTION 252

Software as a Service (SaaS)

ANSWER

Disclosing sensitive data to attackers.

QUESTION 253

Anything as a Service (XaaS)

ANSWER

An open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.

QUESTION 254

Public cloud model

ANSWER

Alternative compiler paths, changes the final binary file.

QUESTION 255

Community Cloud Model

ANSWER

Repeatable tasks are completed the same way each time no matter who is executing the task, reduces errors. Increase scalability - as volume and rate increases, automation enables continuous processing of information. Enable "more with less" - Existing resources can do more volume or provide opportunities for existing resources to work on higher-level tasks.

QUESTION 256

Private cloud model

ANSWER

Using technology to automate IT processes.

QUESTION 257

Hybrid Cloud model

ANSWER

Check for a particular event and react

QUESTION 258

Cloud service providers

ANSWER

Perform ongoing automated checks Cloud-based technologies allow for constant change Automatically validate a configuration before going live

QUESTION 259

Managed service provider (MSP)

ANSWER

Code is constantly written and merged - Many chances for security problems - So many checks are created

QUESTION 260

Managed security service provider (MSSP)

ANSWER

A methodology that focuses on making sure software is always in a releasable state throughout its lifecycle. - Automate the testing process - Automate the release process

QUESTION 261

On-premises vs. off-premises

ANSWER

- Even more automation Entire testing and deploying process is automated

QUESTION 262

Fog Computing

ANSWER

Increase or decrease resources

QUESTION 263

Edge Computing

ANSWER

Adapt to increase load

QUESTION 264

Thin Client

ANSWER

Multiple different login via trusted sources (FB, Google, Twitter)

QUESTION 265

Containers

ANSWER

A system you can trust

QUESTION 266

Microservices/API

ANSWER

A one-time password that changes after a set period of time.

QUESTION 267

Infrastructure as code

ANSWER

A one-time password

QUESTION 268

Software Defined Networking (SDN)

ANSWER

Text code for pw

QUESTION 269

Software-defined visibility (SDV)

ANSWER

Primitive password

QUESTION 270

Serverless architecture

ANSWER

Physical hardware token

QUESTION 271

Services integration

ANSWER

an alert or email message sent to your phone

QUESTION 272

Resource policies

ANSWER

call for authentication

QUESTION 273

Transit gateway

ANSWER

insert into computer for authentication

QUESTION 274

Virtualization

ANSWER

the identification of a user based fingerprint, iris, face, voice, or handwriting

QUESTION 275

Virtual machine (VM) sprawl avoidance

ANSWER

finger

QUESTION 276

VM Escape Protection

ANSWER

Back of eye

QUESTION 277

Environment development

ANSWER

front of eye (color, texture)

QUESTION 278

Environment Test

ANSWER

face

QUESTION 279

Environment Staging

ANSWER

voice

QUESTION 280

Environment production

ANSWER

vein on arm

QUESTION 281

Environment Quality assurance (QA)

ANSWER

how you walk

QUESTION 282

Provisioning and Deprovisioning

ANSWER

Letting bad people in

QUESTION 283

Integrity measurement

ANSWER

Letting good people in

QUESTION 284

Secure Coding Techniques

ANSWER

Between good and bad - just right

QUESTION 285

Normalization

ANSWER

- Comparing to what you know - password - Have - smart card - Are - biometric

QUESTION 286

Stored procedures

ANSWER

Where - where are you Do - signature / similar to biometric but not exactly bc it is something you are doing Know - social factor

QUESTION 287

Obfuscation/camouflage

ANSWER

- Prove you are who you say you are - Based on your id, what is your access - Accounting, record yourself

QUESTION 288

Code reuse/dead code

ANSWER

Cloud - 3rd party, centralized platform, automation options with API integration On-premises - internal monitoring and management

QUESTION 289

Server-Side vs. Client-Side Execution and Validation

ANSWER

Balance server

QUESTION 290

Memory management

ANSWER

Aggregate bandwidth, redundant paths

QUESTION 291

Use of third-party libraries and software development kits (SDKS)

ANSWER

- Short-term backup power Has batteries on the inside

QUESTION 292

Data Exposure

ANSWER

Internal and external power supply

QUESTION 293

Open Web Application Security Project (OWASP)

ANSWER

Power outlets that can be controlled

QUESTION 294

Software diversity

ANSWER

Specialized high performance network of storage devices

QUESTION 295

Compiler

ANSWER

Copy VM to another VM

QUESTION 296

Binary

ANSWER

Speed, Money, Security

QUESTION 297

Automation/Scripting

ANSWER

Everything Backup Time - High Restore Time - Low

QUESTION 298

Automated Courses of Action

ANSWER

All files that has changed since last incremental Backup Time - Low Restore Time - High

QUESTION 299

Continuous monitoring

ANSWER

All files that has changed since last full backup Backup Time - Moderate Restore Time - Moderate

QUESTION 300

Continuous validation

ANSWER

Connect to a shared storage device across the network

QUESTION 301

Continuous integration (CI)

ANSWER

Look and feel like a separate storage device

QUESTION 302

Continuous delivery

ANSWER

To the cloud

QUESTION 303

Continuous deployment

ANSWER

Capture an exactly replica of everything on a storage drive.

QUESTION 304

Elasticity

ANSWER

Speed difference Security

QUESTION 305

Scalability

ANSWER

The cloud is always in motion

QUESTION 306

Version Control

ANSWER

Fall back to a previous snapshot

QUESTION 307

Authentication methods

ANSWER

Redundancy Doesn't always mean availability due to a special case of turning on the redundant device Higher cost

QUESTION 308

Federation

ANSWER

Which cores are needed first before other components are restored - Restore database first before anything else is restored.

QUESTION 309

Attestation

ANSWER

Different technologies can help bypass a single point of failure. - Using multiple different OS - Many vendors

QUESTION 310

Time-based one-time password (TOTP)

ANSWER

All crytography is temporary

QUESTION 311

HMAC-based one-time password (HOTP)

ANSWER

Admin control Physical Technical Combine them together

QUESTION 312

Short message service (SMS)

ANSWER

Hardware/software designed for a specific function Cons - Limited features - Limit upgradability - Limits in communication options - Power may be using batteries bc no access to power - Computational power low - Network may not have access - Limited hardware/crypto options - Inability to patch - Authentication - Range - Low cost can affect quality - Implied trust Pros - Low cost - Single function however may be using batteries

QUESTION 313

Token key

ANSWER

an integrated circuit that can be configured after being manufactured. Reprogram the FPGA

QUESTION 314

Static codes

ANSWER

PC manages industrial equipment (Distributed control systems) No access from the outside (no internet access)

QUESTION 315

Authentication applications

ANSWER

Sensors that can be connected to the internet Smart devices Wearable technology Facility automation Note - weak security

QUESTION 316

Push notifications

ANSWER

Temperature, air quality, lighting

QUESTION 317

Phone call

ANSWER

TIO manufacturers are not security professional

QUESTION 318

smart card authentication

ANSWER

Ex/ Heart monitors - uses old OS

QUESTION 319

Biometrics

ANSWER

Tesla

QUESTION 320

Fingerprints Biometrics

ANSWER

DoS could damage the aircraft

QUESTION 321

Retina Biometrics

ANSWER

Measure power and water usage

QUESTION 322

Iris Biometrics

ANSWER

Uses IP technology to transmit telephone calls

QUESTION 323

Facial Biometrics

ANSWER

Systems that provide and regulate heating and cooling.

QUESTION 324

Voice Biometrics

ANSWER

No pilot

QUESTION 325

Vein Biometrics

ANSWER

An all-in-one output device that usually combines a scanner, a laser or inkjet printer, and a fax modem.

QUESTION 326

Gait analysis Biometrics

ANSWER

An operating system with a deterministic processing schedule - No time to wait for other processes - Industrial/Military equipment

QUESTION 327

Efficacy rates Biometrics

ANSWER

Embedded systems with camera

QUESTION 328

False acceptance Biometrics

ANSWER

Embedded system runs on this. Ex/ Raspberry Pi

QUESTION 329

False rejection Biometrics

ANSWER

Uses higher frequencies - Significant IoT impacts - Bandwidth becomes less of a constraint - Larger data transfer - Faster monitoring and notification - Additional cloud processing

QUESTION 330

Crossover error rate Biometrics

ANSWER

Communicate analog signals over a narrow range of frequencies - Over longer distance - Conserve the frequency use - SCADA - Sensors in oil field

QUESTION 331

multifactor authentication (MFA) factors and attributes

ANSWER

Uses a SINGLE cable with a digital signal Ethernet connection

QUESTION 332

Factors: - Something you know - Something you have - Something you are

ANSWER

Used to provide information to a cellular network provider

QUESTION 333

Attributes: - Somewhere you are - Something you can do - Someone you know

ANSWER

IoT networking - Open standard - IEEE 802.15.4 PAN Alternative to WiFi and Bluetooth - Longer distance/Less power than Bluetooth/WiFi Mesh network of all Zigbee devices in your home Uses the ISM band - Industrial, Scientific, and Medical

QUESTION 334

- Authorization, authorization, and accounting (AAA)

ANSWER

All doors normally unlocked - Opening one door causes other to lock All doors normally locked - Unlocking one door prevents others from being unlocked When one is open the other cannot be unlocked

QUESTION 335

Cloud vs. on-premises requirements

ANSWER

Circuit base, motion based, panic button based

QUESTION 336

Redundancy

ANSWER

Signs of information (dangers)

QUESTION 337

Geographic dispersal

ANSWER

Video cameras and receivers used for surveillance in areas that require security monitoring.

QUESTION 338

Disk - Redundant array of inexpensive disks (RAID) levels

ANSWER

Blend into the environment by not advertising information and protecting it

QUESTION 339

Multipath

ANSWER

Guards: Robot sentries: Reception: Two-person integrity/control: No single person will have complete access to an area

QUESTION 340

Network: Load balancers

ANSWER

Biometrics: Electronic: Physical: Cable Locks: Lock your hardware to the physical location

QUESTION 341

Network interface card teaming

ANSWER

Blocks data transfer when connecting to USB port

QUESTION 342

Power: Uninterruptible power supply (UPS)

ANSWER

Attacker avoid light Fence: Tall, Hard to cut, See through or not

QUESTION 343

Power: Generator

ANSWER

Detects your access card

QUESTION 344

Power: Dual supply

ANSWER

Identify water leaks

QUESTION 345

Managed power distribution units (PDUS)

ANSWER

Blocks electromagnetic fields Not a comprehensive solution because not all signal types can be blocked

QUESTION 346

Replication

ANSWER

Separate subnet from the internal network

QUESTION 347

Storage area network

ANSWER

Physically secure the data

QUESTION 348

VM Replication

ANSWER

Physical separation between networks

QUESTION 349

On-premises vs. cloud Replication

ANSWER

Secured ROOM to store backup media or other important things

QUESTION 350

Backup types

ANSWER

Smaller object to protect things

QUESTION 351

Backup types: Full

ANSWER

Hot air is taken out

QUESTION 352

Backup types: Incremental

ANSWER

Cool air is blown here

QUESTION 353

Backup types: Snapshot

ANSWER

Burning: No going back Shredding: Pulping: Removes the ink and recycles paper Pulverizing: Degaussing: Strong electromagnetic field to destroy Third-party solutions:

QUESTION 354

Backup types: Differential

ANSWER

Prove the message was not changed is not fake because sign with a private key and verify with a public key

QUESTION 355

Backup types: Tape

ANSWER

Add some random data

QUESTION 356

Backup types: Disk

ANSWER

Refers to the process used to exchange keys between users who send a message and those who receive it.

QUESTION 357

Backup types: Copy

ANSWER

An algorithm that uses elliptic curves instead of prime numbers to compute keys. Good for low CPU devices

QUESTION 358

Backup types: Network-attached storage (NAS)

ANSWER

Public key systems that generate random public keys that are different for each session.

QUESTION 359

Backup types: Storage area network

ANSWER

Protect against eavesdropping using quantum cryptography - Send unbreakable encryption because if it's identical on both sides then the key was not viewed during transmission

QUESTION 360

Backup types: Cloud

ANSWER

1 and 0 are both in the same bit so compare to traditional computing

QUESTION 361

Backup types: Image

ANSWER

Breaks our existing encryption mechanism

QUESTION 362

Backup types: Online vs. offline

ANSWER

Temporary

QUESTION 363

Backup types: Offsite storage- Distance considerations

ANSWER

Authenticated: Unauthenticated: Counter:

QUESTION 364

Non-persistence

ANSWER

Keep track of transaction Everyone on the blockchain network maintains the ledger Cryptocurrency

QUESTION 365

Revert to known state

ANSWER

Stream: Encrypt one bit or byte at a time, used with symmetric encryption. High speed, low hardware complexity Block: Encrypt fixed-length group (64 bit/128 bit)

QUESTION 366

Last known-good configuration

ANSWER

Symmetric - A single, shared key for all encryption Doesn't scale very well Asymmetric - Two (or more) mathematically related keys - Public Key - anyone can see - Private Key - used to decrypt the public key - Two way encryption and decryption Basically - I need the public key from another user to send them encrypted information, they need the private key to decrypt that information Con - requires CPU power to decrypt information

QUESTION 367

Live boot media

ANSWER

Low CPU and power requirement

QUESTION 368

High availability (Scalability)

ANSWER

Audio: Hide information in Audio Video: Hide information in Video Image: Hide information in Image

QUESTION 369

Restoration order

ANSWER

Enables processing of encrypted data without the need to decrypt the data. It allows the cloud customer to upload data to a cloud service provider for processing without the requirement to decipher the data first.

QUESTION 370

Diversity: Technologies

ANSWER

Confidentiality Integrity Obfuscation - hides malware code from the computer

QUESTION 371

Diversity: Vendors

ANSWER

Mobile devices, portable systems Requires ECC for asymmetric encryption

QUESTION 372

Diversity: Crypto

ANSWER

Fast computation time

QUESTION 373

Diversity: Controls

ANSWER

Most power encryption possible - longer keys

QUESTION 374

Embedded systems

ANSWER

Modern malware tries to hide itself. Encrypted data hides the active malware code. Decryption occurs during execution.

QUESTION 375

Raspberry Pi

ANSWER

Password hashing. Protect the original password. Add salts to randomize the stored password hash.

QUESTION 376

Field Programmable Gate Array (FPGA)

ANSWER

A digital signature provides both integrity and the origin of the data. Confirm the authenticity of data. The only person that could have sent the data is the sender. Example - Message Authentication Code (MAC)

QUESTION 377

Arduino

ANSWER

Need speed and power CPU

QUESTION 378

Supervisory control and date acquisition (SCADA)/ Industrial Control System (ICS)

ANSWER

Make sure the size doesn't increase pass your limit Block must be fixed length so if it is short, additional data is added in

QUESTION 379

Facilities

ANSWER

Larger keys are better

QUESTION 380

Industrial

ANSWER

Asymmetric is slower than symmetric

QUESTION 381

Manufacturing

ANSWER

A specific cryptographic technology can become less sure over time

QUESTION 382

Energy

ANSWER

Randoms numbers are critical Nothing can be predictable

QUESTION 383

Logistics

ANSWER

Single key is a Single point of failure Multiple keys require more overhead

QUESTION 384

Internet of Things (IoT)

ANSWER

IoT devices have limited CPU, memory, power

QUESTION 385

Sensors

ANSWER

Encrypted terminal communication and file transfer

QUESTION 386

Smart devices

ANSWER

For encrypted telephone calls

QUESTION 387

Wearables

ANSWER

Protocol for reading and writing directories over an IP network

QUESTION 388

Facility automation

ANSWER

Using SSL to encrypt data NOT SFTP

QUESTION 389

Weak defaults

ANSWER

Using SSH to transfer file Allows - File system functions - Resume interruption

QUESTION 390

Specialized Medical systems

ANSWER

Internet Protocol Security - commination between two location - data is encrypted Very standardized - common in use Setup - Authentication Header - Encapsulation Security Payload

QUESTION 391

Specialized Vehicles

ANSWER

AH - Hash of the packet and a shared key This doesn't provide encryption - Provides integrity - Guarantees data origin - Prevents replay attacks ------------------------------------- Encapsulation Security Payload - Encrypts and authenticates the tunneled data - Combines with AH for integrity and authentication of the outer header

QUESTION 392

Specialized Aircraft

ANSWER

Two ways to send encrypted data Transport - IP Header / IPsec Header / Data / IPsec Trailers Tunnel - New IP Header / IPsecHeader / IP Header / Data / IPsec Trailer Difference - Transport the headers are not encrypted - Tunnel it is - Tunnel is also better and more common

QUESTION 393

Specialized smart meters

ANSWER

NTP

QUESTION 394

Voice over IP (VoIP)

ANSWER

S/MIME - Secure/Multipurpose Internet Mail Extensions - public key encryption and digital signing of mail content Secure POP and Secure IMAP - Use a STARTTLS extension to encrypt POP3 with SSL or use IMAP with SSL SSL/TLS - If the mail is browser based always encrypt with SSL

QUESTION 395

Heating, ventilation, air conditioning (HVAC)

ANSWER

The process of converting a domain name into a public IP address. DNSSEC - Domain Name System Security Extension

QUESTION 396

Drones

ANSWER

Automated subscriptions/updates - Anti-virus / Anti-malware signature updates - IPS updates - Malicious IP address databases / Firewall updates Constant updates uses a different method of updating (different Protocols and communicating to diff IP addresses) Check for encryption and integrity checks - so that we know we are getting information from trusted sources

QUESTION 397

Multifunction printer (MFP)

ANSWER

Protect all user end points

QUESTION 398

Real-time operating system (RTOS)

ANSWER

Protection from specifically malware (Trojans, worms, macro viruses) Both terms are usually used interchangeably nowadays

QUESTION 399

Surveillance systems

ANSWER

Malware refers to broader category (spyware, ransomware, fileless malware) Both terms are usually used interchangeably nowadays

QUESTION 400

System on chip (SoC)

ANSWER

A method of threat protection - Scale to meet the increasing number of threats Detection of malisous code without using just signatures. Includes - Behavioral analysis, machine learning, process monitoring - Looking for actions instead of signatures Respond to the threat - Isolate the system - Quarantine the threat - Rollback

QUESTION 401

Communication considerations: 5G

ANSWER

Data Loss Prevention Stop the data before the attacker gets it If the system detects that sensitive data is being sent outside the system, it can block it

QUESTION 402

Communication considerations: Narrow-band

ANSWER

Firewall of the network Identify applications on the network and filter their data Broad Security controls - Sets policies for application's features (allow viewing of Twitter but no posting to it) - Identify attacks and malware - Examine encrypted data - Prevent access to URLs or URL categories

QUESTION 403

Communication considerations: Baseband radio

ANSWER

Firewall of the endpoint Software-based firewall (Personal firewall) - Allow/disallow incoming/outgoing traffic - ID and block unknown processes

QUESTION 404

Subscriber identity module (SIM) cards

ANSWER

Uses log files to ID intrusions

QUESTION 405

Zigbee

ANSWER

Recognize and block known attacks Uses log files to ID intrusions HIPS Identifications - Signatures, heuristics, behavioral - Buffer overflows, registry updates, writing files to the Windows folder - Access to non-encrypted data IPS is both detective or preventive

QUESTION 406

Constraints: Power

ANSWER

Perfect infection point - Control of the kernel mode - means the control of everything Chain of trust - Secure boot, trusted boot, and measured boot

QUESTION 407

Constraints: Compute

ANSWER

Security of software BIOs contain manufacturer's public key so no one can do a fake update to your computer Secure boot verifies the bootloader so that no software can change the boot order

QUESTION 408

Constraints: Network

ANSWER

Checks nothing on this computer has changed UEFI stores the hash of the firmware, boot drivers, and everything else loaded during the Secure Boot and Trusted Boot process - Stored in the TPM of the system

QUESTION 409

Constraints: Crypto

ANSWER

Device provides aan operational report to a verification server - If anything is different on the computer compare to what is stored on the server, the system can be shutdown

QUESTION 410

Constraints: Inability to patch

ANSWER

Don't store the actual data in the database but store a token. Replace sensitive data with a non-sensitive placeholder - Common with credit card processing Nothing is hashed or encrypted. The original data and token aren't mathematically related.

QUESTION 411

Constraints: Authentication

ANSWER

Random data added to a password when hashing. Salt should all be random. Random tables won't table with salted hashes because the random values mess up matching without salts hashes.

QUESTION 412

Constraints: Range

ANSWER

Hashes represent data as a fixed length string of text. Must have - No collisions - One-way trip

QUESTION 413

Constraints: Cost

ANSWER

What is the expected input. - Document all inputs. - Check and correct all input (normalization)

QUESTION 414

Constraints: Implied trust

ANSWER

Secure cookies have a secure attribute set - Only browser will only send it over HTTPS Sensitive information should not be saved in cookies.

QUESTION 415

Bollards/barricades

ANSWER

Allow and no allow certain task in communication. Enforces HTTPS communication Prevent XSS attacks - Only allow scripts, stylesheets, or images from the local site - Prevent data from loading an inline frame (iframe)

QUESTION 416

Access control vestibules

ANSWER

The application code can be digitally signed by the developer. - A trusted CA signs the developer's public key. - Developer signs the code with their private key. - For internal apps, use your own CA

QUESTION 417

Badges

ANSWER

Analysis of source code carried out without execution of that software.

QUESTION 418

Alarms

ANSWER

Send random input to an application to find an opportunity to find an exploit.

QUESTION 419

Signage

ANSWER

A technique of penetration testing that can include providing unexpected values as input to an application to make it crash. Take a lot of time and processing power.

QUESTION 420

Cameras

ANSWER

Minimize the attack surface - Remove all possible entry points.

QUESTION 421

Motion recognition and object detection

ANSWER

Every open port is a possible entry point. Close everything except required ports. Controlled by the firewall - IP - Ports NGFW (Next-Gen Firewall) - Controls applications

QUESTION 422

closed circuit television (CCTV)

ANSWER

Primary configuration database for Windows. Almost everything can be configured from the registry. Some registry changes are important security settings - Configure registry permissions. - Disable SMBv1 (Enabling a vul)

QUESTION 423

Industrial camouflage

ANSWER

Best protection against data compromise in the event of physical theft of the device.

QUESTION 424

Personnel

ANSWER

Keep OS up to date. User Accounts - Minimum password lengths and complexity. - Account limitations

QUESTION 425

Locks

ANSWER

Monthly updates Third-party updates Auto-update: not always the best option because the updates need to be check to be good first - However, if it is an important update - then it will be pushed in.

QUESTION 426

USB data blocker

ANSWER

Opal:

QUESTION 427

Lighting and fencing

ANSWER

The hardware starting point in a chain of trust. The trust has to start somewhere - Trusted Platform Module (TPM) - Hardware Security Module (HSM) - Designed to be the hardware root of the trust

QUESTION 428

Fire suppression

ANSWER

Hardware Security A specification for cryptographic function - Hardware to help with encryption Cryptographic processor - Random Number generator Persistent memory - Comes with a unique key Versatile memory - Storage keys, hardware configuration information Password protected - No dictionary attacks

QUESTION 429

Sensors: Motion detection

ANSWER

Applications cannot access unrelated resources.

QUESTION 430

Sensors: Noise detection

ANSWER

Split tunnel - Admin can config data to be sent into the tunnel while other data can be sent to outside the tunnel Full tunnel - VPN Concentrator decrypts VPN's data - User can't send data to another device not part of the tunnel

QUESTION 431

Sensors: Proximity Reader

ANSWER

Site-to-site (Corporate Network to remote site) - VPN Concentrator to VPN concentrator

QUESTION 432

Sensors: Moisture detection

ANSWER

Internet Protocol Security - Security for OSI Layer 3 - Encryption and packet signing - Very standardized Two core IPSec protocols - Authentication Header - Encapsulation Security Payload

QUESTION 433

Sensors: Cards

ANSWER

No firewall issue - No requirement for digital certificates or shared passwords like IPSec - Can be run from browser

QUESTION 434

Sensors: Temperature

ANSWER

- API support - Web cryptography API - No application needed, all in browser Needs - A browser that supports HTML5

QUESTION 435

Visitor logs

ANSWER

Control at the edge - hard to change - Your internet link - Managed primarily through firewall rules - Firewall rules rarely change Access Control - rules can change at anytime - Control from wherever you are - Access can be based on many rules - Access can be easily revoked or changed

QUESTION 436

Faraday cages

ANSWER

Physical ports Control and Protect - Limit overall traffic - Control specific traffic types - Watch for unusual or unwanted traffic

QUESTION 437

Air gap

ANSWER

The switch can control broadcasts - Limit the number of broadcasts per second Can often be used to control multicast and unknown unicast traffic Manage by specific values or percentages - Control amount of broadcasts

QUESTION 438

Screened subnet

ANSWER

Spanning tree takes time to determine if a switch port should forward frames - Bypass the listening and learning states of Spanning tree protocol because we expect an end user device to be connected - Problem - this trust can be abused by connecting another switch and then there would be another loop Solution - BPDU guard - The switch is constantly watching for a BPDU frame because of a possible switch on this communication and disable this interface before a loop could happen.

QUESTION 439

Protected cable distribution

ANSWER

Connect two switches to each other - They'll send traffic back and forth forever - Bringing down a network Spanning tree protocol prevents loops - Block ports to disconnect loops - If a path crashes then the protocol will create a new path to communicate to the destination

QUESTION 440

Secure areas

ANSWER

IP tracking on a layer 2 device (switch) - The switch is a DHCP firewall - Trusted: Routers, switches, DHCP servers - Untrusted: Other computers, unofficial DHCP servers Switch watches for DHCP conversations - Adds a list of untrusted devices to a table Filters invalid IP and DHCP information - Static IP addresses - Devices acting as DHCP servers - Other invalid traffic patterns

QUESTION 441

Secure areas: Air Gap

ANSWER

Media Access Control - Hardware address Limit access through the physical hardware address

QUESTION 442

Secure areas: Vault

ANSWER

Access secure network zones - Provide an access mechanism to a protect network

QUESTION 443

Secure areas: Safe

ANSWER

Sits between the user and external network - Receives the user requests and sends the request on their behalf (the proxy) - Useful for caching information, access control, URL content scanning Forward: Control user's access to internet Reverse: User's of the internet are hitting your proxy and gain access to your network (reverse of forward) Open: Third-party, uncontrolled proxy - big security concern because the data can be changed

QUESTION 444

Secure areas: Hot aisle

ANSWER

Intrusion Detection System/Prevention System - Watch network traffic Intrusions - Exploits against OS, apps, etc. - Buffer overflow, cross-site scripting Detection vs Prevention Detection - Alarm you but may not prevent Prevention - Stop it before it gets into the network

QUESTION 445

Secure areas: Cold aisle

ANSWER

Looks for a perfect match of malicious code

QUESTION 446

Secure data destruction

ANSWER

Heuristics - Use AI to identify attacks Behavior - Observe and report attacks

QUESTION 447

Digital signatures:

ANSWER

Build a baseline of what's normal on your network. - Any anomaly will report the attack

QUESTION 448

Key length

ANSWER

Passive - Examine a copy of the traffic - No way to block in realtime Inline - Malicious traffic is immediately identified

QUESTION 449

Key stretching

ANSWER

Collect information to give to the collector - Intrusion prevention systems - Firewall logs - Authentication logs - Web server access logs - Database transaction logs - Email logs

QUESTION 450

Salting

ANSWER

Collects data from sensors and represent it to the admin in a report format. - syslog servers - SIEM consoles

QUESTION 451

Key exchange

ANSWER

Not like a normal firewall - Applies rules to HTTP/HTTPS conversations Allow or deny based on expected input - Upon seeing SQL injection, deny the input

QUESTION 452

Elliptic Curve Cryptography (ECC)

ANSWER

Next-Generation Firewall Control applications along with the default of the old firewall - Intrusion Prevention Systems - Network-based firewall OSI Application Layer Requires some advanced decodes - Every packet must be analyzed and categorized before a security decision is determined Content filtering

QUESTION 453

Perfect forward secrecy

ANSWER

Stateful firewall remember the state of the session - Only one rule needed for each connection ACLs Table -> Session Table

QUESTION 454

Quantum communication

ANSWER

Older Does not keep track of traffic flow - Both direction needs their own state of rules (in/out)

QUESTION 455

Quantum computing

ANSWER

Old - replaced with NGFW Unified Threat Management - URL filter/ Content inspection - Malware inspection - Spam filter - CSU/DSU - Router, Switch - Firewall - IDS/IPS - Bandwidth shaper - VPN endpoint

QUESTION 456

Post-quantum

ANSWER

Open source - Provide traditional firewall functionality Proprietary - features include application control and high-speed hardware

QUESTION 457

Ephemeral

ANSWER

Hardware - Purpose built hardware provides efficient and flexible connectivity options Software - firewalls can be installed almost anywhere

QUESTION 458

Modes of operation

ANSWER

Appliance - Provide the fastest throughput Host-based - Are application-aware and can view non-encrypted data Virtual - provide valuable East/West network security

QUESTION 459

Blockchain and public ledgers

ANSWER

Port taps:

QUESTION 460

Cipher Suites

ANSWER

WPA2 encryption - CCMP block cipher mode - Encryption of wifi - Message Integrity Check Problems - PSK Brute-force attack - if the attacker has one part of the key by listening to the four-way handshake - When the attacker has the hash they can brute-force PSK - Pre-shared key

QUESTION 461

Symmetric vs. asymmetric

ANSWER

WPA3 encryption - GCMP block cipher mode - Encryption of wifi - Stronger than WPA2 - Message Integrity Check Upgrade from WPA2 - Include mutual authentication - Create a shared session key without sending that key across the network - No more four-way handshakes, hashes - New key per session

QUESTION 462

Lightweight cryptography

ANSWER

Used with WPA2 for encryption and integrity check

QUESTION 463

Steganography

ANSWER

- Key exchange with an authentication component - Everyone uses a different session key, even with the same PSK - An IEEE standard - the dragonfly handshake

QUESTION 464

Homomorphic Encryption

ANSWER

An authentication framework that provides general guidance for authentication methods.

QUESTION 465

Common use cases

ANSWER

Using TLS tunnel, but instead of using a shared secret using a PAC this is using a digital certificate. Server needs the certificate but the users do not need it.

QUESTION 466

Low power devices

ANSWER

EAP-Flexible Authentication via Secure Tunneling Supplicant receives PAC Supplicant and AS mutually authenticate and negotiate a TLS tunnel User authentication occurs over the TLS tunnel

QUESTION 467

Low latency

ANSWER

EAP-Transport Layer Security - Uses PKI, requiring both server-side and client-side certificates. Very strong security

QUESTION 468

High resiliency

ANSWER

Extensible Authentication Protocol-Tunneled Transport Layer Security Requires a digital certificate on the Authentication Server - Does not require digital certificates on every device - Builds a TLS tunnel using this digital certificate Once the tunnel is created, other authentication methods can be used inside the TLS tunnel - Other EAPs - MSCHAPv2 - Anything else

QUESTION 469

Supporting confidentiality

ANSWER

A standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails.

QUESTION 470

Supporting integrity

ANSWER

Link a user's identity across multiple authentication servers

QUESTION 471

Supporting Obfuscation

ANSWER

PSK - Everyone uses the same key to login Enterprise - Authenticated users individually with the authentication server Open - No password is required

QUESTION 472

Supporting Authentication

ANSWER

An automated setup for mobile devices. Different ways to connnect - PIN configured on access point - Push a button on the access point - Near field communication - bring mobile device close to access point Problems - WPS sucks because easy to brute force

QUESTION 473

Supporting Non-Repudiation

ANSWER

Authentication to the network - When you try to connect to a starbucks WiFi and they send you to some random page to accept something - Removes access after session expires

QUESTION 474

Limitations: Speed

ANSWER

Sample the existing wireless spectrum Identify existing access points Work around existing frequencies - layout and plan for interference Plan for ongoing site surveys - things will certainly change

QUESTION 475

Limitations: Size

ANSWER

Identify wireless signal strengths

QUESTION 476

Limitations: Weak keys

ANSWER

Analyze the wifi of the area - Signal coverage - Potential interference

QUESTION 477

Limitations: Time

ANSWER

Overlapping channels - Frequency conflicts - use non-overlapping channels - Automatic or manual configurations

QUESTION 478

Limitations: Longevity

ANSWER

Minimal overlap - Maximize coverage, minimize the number of access points Avoid interference - Electronic devices (microwaves) - Building materials - Third-party wireless networks Signal control - Place APs where the users are - Avoid excessive signal distance

QUESTION 479

Limitations: Predictability

ANSWER

Wireless controllers - Centralized management of wireless access points - Manage system configuration and performance Securing wireless controllers - Control access to management console - Use strong encryption with HTTPS - Automatic logout after no activity Securing access points - Use strong passwords - Update to the latest fireware

QUESTION 480

Limitations: Reuse

ANSWER

Mobile devices Separate land into cells Security concerns - Traffic monitoring - Location tracking - Worldwide access to a mobile device

QUESTION 481

Limitations: Entropy

ANSWER

Local network access Same security concerns like cellular - Data capture - On-path attack - modify/monitor data - DoS

QUESTION 482

Limitations: Computational overheads

ANSWER

High speed communication over short distance Connects to our mobile devices - Car - Headset

QUESTION 483

Limitations: Resource vs. security constraints

ANSWER

Near field communication - Payment systems Pog Security Concerns - Information can be capture but you have to be close - Jamming is possible - Relay/Replay attack - Loss of NFC device will make you unable to use the function of your NFC device

QUESTION 484

Protocols

ANSWER

Connecting two devices

QUESTION 485

Domain Name System security extension (DNSSEC)

ANSWER

Example - router to all devices in the house - Does not imply full connectivity between nodes

QUESTION 486

SSH

ANSWER

Created by the US DoD - Over 30 satellites currently in orbit - Need 4 satellite to be precise

QUESTION 487

Secure/multipurpose Internet Mail Extensions (S/MIME)

ANSWER

It's everywhere - Access badges - Inventory/Assembly line tracking - Pet/Animal identification - Anything that needs to be tracked Radar technology - Bidirectional communication - RF powers the tag, ID is transmitted back

QUESTION 488

Secure Real-time Protocol (SRTP)

ANSWER

Hardware Security Module that has shrank to a microSD card form Provides: - Encryption - Key Generation - Digital signatures - Authentication Secure storage: - Protect private keys - Cryptocurrency storage

QUESTION 489

Lightweight Directory Access Protocol over TLS/SSL (LDAPS)

ANSWER

UEM - Allows end users to use different devices all together with the same security policy - All devices can be used anywhere and not one place

QUESTION 490

File Transfer Protocol Secure (FTPS)

ANSWER

Provision, update, and remove apps - Keep everyone running at the correct version Create an enterprise app catalog - Users can choose and install the apps they need Monitor application use Wipe application from use

QUESTION 491

SSH File Transfer Protocol (SFTP)

ANSWER

Security enhancements for android - Supports access control security policies Goal - Provide security for entire Android policy system Protect privileged Android system daemons Centralized Policy Copnfiguration - Manages Android deployments

QUESTION 492

Simple Network Management Protocol, version 3 (SNMPv3)

ANSWER

Centralized app store - Apple App Store - Google Play Not all applications are secure - Vulnerabilities, data leakage Not all applications are appropriate for business use - Games, IM, etc. MDM can allow or deny app store use

QUESTION 493

Hypertext transfer protocol over SSL/TLS (HTTPS)

ANSWER

Mobile devices are purpose-built system with no need to access the OS Android - Rooting Apple - Jailbreaking To do: - Install custom firmware and replace the existing OS Uncontrolled access - MDM becomes useless

QUESTION 494

IPSec

ANSWER

Go outside the scope of the App Store and download and install apps directly

QUESTION 495

Authentication header (AH)/Encapsulating Security Payloads (ESP)

ANSWER

Replaces the OS and makes the MDM useless

QUESTION 496

Tunnel/transport

ANSWER

Most phones are locked to a carrier because the carrier is subsidizing the cost of the phone You can unlock the phone: - If your carrier allows it from paying it off or having it for a while - A carrier lock may be illegal in your country Moving carriers can put your MDM at risk

QUESTION 497

Secure Post Office Protocol (POP)/ Internet Message Protocol (IMAP)

ANSWER

OS of mobile devices are constantly changing Updates are over the air May not be good updates

QUESTION 498

Use cases

ANSWER

Cameras are controversial - Corporate espionage, inappropriate use Almost impossible to control on the device Camera use can be controlled by the MDM - Always disabled - Enabled except for certain locations

QUESTION 499

Voice and video

ANSWER

Short Message Service/Multimedia Messaging Service - Text messages, video, audio Control of data can be a concern: - Data leak, financial disclosures - Inbound notifications, phishing attempts MDM can enable or disable SMS/MMS

QUESTION 500

Time synchronization

ANSWER

Store data onto external or removable drives MDM can set security policies on these devices

QUESTION 501

Email and web

ANSWER

Cable that can connect to mobile device between two devices

QUESTION 502

File transfer

ANSWER

Capturing audio has a lot of legal concerns depending on your state MDM can disable or geo-fence the feature

QUESTION 503

Directory services

ANSWER

Phone knows your location - Adds your location to document metadata - Every document many contain a geotag

QUESTION 504

Remote access

ANSWER

We're so used to access points Ad hoc: Connect wireless devices directly with one another Wifi Direct: Simplifies the process - Easily connect many devices together - Common to see in-home devices Simplify can add vulnerabilities

QUESTION 505

Domain Name resolution

ANSWER

Use your personal wireless router for other devices Concern - Could allow outsiders into the network accidently

QUESTION 506

Routing and switching

ANSWER

Apply Pay, Android Pay, Samsung Pay NFC

QUESTION 507

Network address allocation

ANSWER

Personal use and cooperate use of a personal device

QUESTION 508

Subscription services

ANSWER

Corporate owned first and allowed for personal use

QUESTION 509

Endpoint protection

ANSWER

You can choose what device to get and the company buys it for company/personal use

QUESTION 510

Antivirus

ANSWER

No personal use at all

QUESTION 511

Anti-malware

ANSWER

All the data is store somewhere (not on your mobile device) and you connect to it Application can be managed centrally - No need to update all mobile devices

QUESTION 512

Endpoint detection and response (EDR)

ANSWER

One permission mistake can cause a data breach Public access should not be default Options: - Identity and Access Management (IAM) - Bucket policies - Globally blocking public access - Don't put data in the cloud unless it really needs to be there

QUESTION 513

DLP

ANSWER

Cloud data is more accessible than non-cloud data Server-side encryption - Encrypt the data in the cloud - Data is encrypted when stored on the disk Client-side encryption - Data is already encrypted when sent to the cloud - Performed by the application Key management is critical

QUESTION 514

Next-generation firewall (NGFW)

ANSWER

Copy data from one place to another Disaster recovery, high availability - Plan for problems - Maintain uptime if an outage occurs - Hot site for disaster recovery Data analysis - Analytics big data analysis Backups - Constant duplication of data

QUESTION 515

Host-based firewall

ANSWER

Always available incase of emergency

QUESTION 516

Host-based intrusion detection system (HIDS)

ANSWER

A cloud contains virtual devices - Servers, databases, storage devices Virtual switches, virtual routers - Build the network from the cloud console - The same configurations as a physical device Difference - Can be made at anytime - Fast

QUESTION 517

Host-based intrusion prevention system (HIPS)

ANSWER

Private cloud - All interal IP addresses - only way to connect is to use some kind of private network - No access from internet Public cloud - External IP address - Anyone can connect Hybrid cloud - Best of both worlds

QUESTION 518

Boot integrity

ANSWER

The cloud contains separate VPCs, containers, and microservices Separation is a security opportunity - Data is separate from the application - Add security systems between application components Virtualized security technologies - Web application Firewall (WAF) - Next-Generation Firewall (NGFW) -- Many NGFW include Intrusion Prevention System (IPS) to check for known malicious code that may be on the network

QUESTION 519

Boot security/ Unified Extensible Firmware Interface(UEFI)

ANSWER

Microservice architecture API calls can include risk - Attempts to access critical data - Geographic origin - Unusual API calls API monitoring - View specific API queries - Monitor incoming and outgoing data

QUESTION 520

Measured boot

ANSWER

A firewall for compute instances - Control inbound and outbound traffic flows Layer 4 port number - TCP or UDP port Layer 3 address - Individual addresses - CIDR block notation - IPv4 or IPv6

QUESTION 521

Boot attestation

ANSWER

Provision resources when they are needed - Based on demand - Provisioned automatically Scale up and down - Allocate compute resources where and twhen they are needed - Rapid elaticy - Pay for only what's used Ongoing monitoring

QUESTION 522

Database Tokenization

ANSWER

Granular security controls - Identify and manage very specific data flow - Each instance of a data flow is different Define and set policies - Allow uploads to the corporates box.com file share - Deny certain uploads to personal box.com file share

QUESTION 523

Database salting

ANSWER

VPC gateway endpoint - Allow private cloud subnets to communicate to other cloud services Keep private resources private - Internet connectivity not required

QUESTION 524

Database hashing

ANSWER

Containers have similar security concerns as any other application deployment methods - Bugs, insufficient security controls, misconfigurations Use containers-specific OS - A minimalist OS designed for containers Group container types on the same host - The same purpose, sensitivity, and threat posturte - Limit the scope of any intrusion

QUESTION 525

Application security

ANSWER

Cloud access security broker - Enforce security policy on users Four characteristics - Visibility: Determine what apps are in use and are they authorized - Compliance: Are Users complying with HIPAA? PCI - Threat Prevention: Allow access by authorized users, prevent attacks - Data Security: Ensure that all data transfers are encrypted and Protect the transfer of PII and DLP

QUESTION 526

Input validations

ANSWER

Secure cloud based applications - Application misconfigurations - Authorization and access - API security

QUESTION 527

Secure cookies

ANSWER

Protect users and devices Go beyond URLs and GET requests - Examine the application API - Dropbox for personal use or corporate use Examine JSON strings and API requests - Allow or disallow certain activites Instance-aware security - A development instance is different than a production instance

QUESTION 528

Hypertext transfer Protocol (HTTP) headers

ANSWER

Cost: Need for segmentation: Between microservices, VMs, or VPC Open systems Interconnection (OSI) Layers: Layer 4 TCP/UDP, Layer 7 Applications

QUESTION 529

Code signing

ANSWER

Cloud native controls - Integrated and supported by cloud provider - Many configuration options - No additional cost - Security is part of the infrastructure Third-party solutions - Support across multiple cloud providers - Single pane of glass - Extend policies outside the scope of the cloud provider - More extensive reporting

QUESTION 530

Allow list

ANSWER

A service that can vouch for who a person is. Third party application providing identity. Standards - SAML, OAuth, OpenID Connect, Etc.

QUESTION 531

Block list / deny list

ANSWER

An identifier or property of an entity Personal Attributes - Name, email, phone number, Employer ID - Department name, job title, mail stop One or more attributes can be used for identification.

QUESTION 532

Secure coding practices

ANSWER

Digital certificate - Assigned to a person or device Bind the identity of the certificate owner to a public and private key - Encrypt data - Create a digital signature Requires an existing public-key infrastructure (PKI) - The Certificate Authority (CA) is the trusted entity - The CA digitally signs the certificates

QUESTION 533

Static code analysis

ANSWER

USB Token - Certificate is on the USB device

QUESTION 534

Dynamic code analysis

ANSWER

Secure Shell (SSH) - Secure terminal communication Use a key instead of username and password - Public/private keys - Critical for automation

QUESTION 535

Fuzzing

ANSWER

- Integrates with devices - May require a PIN

QUESTION 536

Hardening

ANSWER

An account on a computer associated with a specific person - Associates the user with an ID number - Storage and files can be private to that user even if another person uses the same computer - No privileged access to the OS - Most people will have this type of account

QUESTION 537

Open ports and services

ANSWER

Shared account Issue - No way to know exactly who was working - Difficult to determine the proper privileges - Everyone needs to be notified of password change Don't do this

QUESTION 538

Registry

ANSWER

Access to a computer for guests - No access to change settings, modify applications, view other user's files - Usually no password - Can cause security problems - Must be controled

QUESTION 539

Disk encryption

ANSWER

Used exclusively by services running on a computer - No interactive/user access - Web server, database server, etc. Access can be defined for a specific service - Web server rights and permissions will be different than database server Commonly use usernames and password - You'll need to determine the best policy for password updates

QUESTION 540

OS

ANSWER

Make your password string to prevent brute-force attack At least 8 characters

QUESTION 541

Patch management

ANSWER

System remembers password used in the past

QUESTION 542

Self-encrypting drive (SED)/ full disk encryption (FDE)

ANSWER

Network location - Based on IP subnet

QUESTION 543

Hardware root of trust

ANSWER

Automatically allow or restrict access when the user is in a specific location

QUESTION 544

Trusted Platform Module (TPM)

ANSWER

Metadata of a document or file - GPS coordinates

QUESTION 545

Sandboxing

ANSWER

Determine's a user's location based on geolocation - GPS - 802.11 - IP address

QUESTION 546

Load balancing:

ANSWER

Access only during normal work hours

QUESTION 547

Load balancing: Active/active

ANSWER

Control access to an account

QUESTION 548

Load balancing: Active/passive

ANSWER

Is everything following the policy - Audits are used to make sure people are following the policies Things to look for auditing - Permission (everyone getting admin account) - Usage (how are resources are being used)

QUESTION 549

Load balancing: Scheduling

ANSWER

Account is locked out after too many incorrect passwords - Prevent brute force attacks

QUESTION 550

Load balancing: Virtual IP

ANSWER

Disable account - Part of normal change process ( when someone leaves the company) - You don't want to delete accounts because they may contain important decrption keys

QUESTION 551

Load balancing: Persistence

ANSWER

Hardware-based authentication

QUESTION 552

Network segmentation

ANSWER

Password managers

QUESTION 553

Virtual local area network (VLAN)

ANSWER

Trusted Platform Module A specification for cryptographic functions - Hardware to help with all of this encryption stuff Cryptographic processor - Random number generator Persistent memory - Comes with a unique key during production Password protected - No dictionary attacks

QUESTION 554

East-west traffic

ANSWER

Use personal knowledge as an authentication factor Static KBA - Pre-configured shared secrets - Often used with account recovery - What was the make and model of your first car? Dynamic KBA - Questions are based on an identity verification service - What was your street number when you were living in Texas

QUESTION 555

Extranet

ANSWER

Challenge-Handshake Authentication Protocol - Encrypted challenge sent over the network Three-way handshake - After link is established, server sends a challenge message - Client responds with a password hash calculated form the challenge and the password - Server compares received hash with stored hash Challenge-Response continues - Occurs periodically during the connection - User never knows it happens Overall: - We are only sending challenges - Or response to challenges Variations: MS-CHAP - still sucks and old

QUESTION 556

Intranet

ANSWER

A basic authentication method - Used in legacy OS - rare to see singularly used Problem: PAP is in the clear - Weak authentication scheme - Non-encrypted password exchange - We didn't require encryption on analog dialup lines - The APPLICATION would need to provide any encryption

QUESTION 557

Zero Trust

ANSWER

The IEEE standard that defines port-based security for wireless network access control Used in conjunction with an access database - RADIUS, LDAP, TACACS+

QUESTION 558

VPN: Always-on

ANSWER

Remote Authentication Dial-in User Service One of the more common AAA protocols - Support on any platforms/devices just not dial-in Centralize authentication for users - Routers, switches, firewalls Available - On almost any server OS Usage - VPN Concentrator

QUESTION 559

VPN: Spilt tunnel vs.full tunnel

ANSWER

Using one authentication credential to access multiple accounts or applications.

QUESTION 560

VPN: Remote access vs. site-to-site

ANSWER

Open standard for authentication and authorization - You can authenticate through a third-party to gain access - One standard does it all, sort of Not originally designed for mobile apps - This has been SAML's largest roadblock How Client -> Resource Server -> Client -> Authorization Server -> Client -> Resource Server

QUESTION 561

VPN: IPSec

ANSWER

TACACS (old) - Remote authentication protocol - Created to control access to dial-up lines to ARPANET TACACS+ - The latest version of TACASCS, not backward compatible - More authentication requests and response codes - Released as an open standard in 1993 Usage - Cisco device

QUESTION 562

VPN: SSL/TLS

ANSWER

Authorization framework - Determines what resources a user will be able to access Create by Twitter, Google, and many others Not an authentication protocol - OpenID connect handles the single sign-on authentication - OAuth provides authorization between application Example - Zapier wants to access your Google Account: This will allow Zapier to See, edit, create and delete all of your Google Drive files

QUESTION 563

VPN: HTML5

ANSWER

Network authentication protocol - Authenticate once, trusted by the system - No need to reauthenticate to everything - Mutual authentication - the client and the server: Protect against on-path or replay attacks Integrated into Microsoft Usage - Microsoft network

QUESTION 564

VPN: Layer 2 tunneling protocol (L2TP)

ANSWER

Topic

QUESTION 565

DNS

ANSWER

Users can have complex relationships to applications and data - Access may be based on many different criteria ABAC can consider many parameters Combine and evaluate multiple parameters - Resources information, IP address, time of day desired action, relationship to the data, etc

QUESTION 566

Network access control (NAC)

ANSWER

You have a role in your organization - Manager, director, team lead, project manager Administrators provide access based on the role of the user - Rights are gained implicitly instead of explicitly In Windows, use Groups to provide role-based access control - You are in shipping and receiving so you can use the shipping software - You are the manager, so you can review shipping logs

QUESTION 567

NAC: Agent and agentless

ANSWER

Generic term for following rules - Condition other than who you are Access is determined through system-enforced rules - System administrators, not users The rule is associated with the object Rule examples

QUESTION 568

Out-of-band management

ANSWER

Mandatory Access Control The OS limits the operation on an object - Based on security clearance levels Every object gets a security label - Confidential, secret, top secret, etc Labeling of objects uses predefined rules - The administrator decides who gets access to what security level - Users can not change settings

QUESTION 569

Port security

ANSWER

You create a spreadsheet - As the owner, you control who has access - You can modify access at any time Very flexible access control - And very weak security

QUESTION 570

Broadcast storm prevention

ANSWER

Difficult to apply old methods of authentication to new methods of working - Mobile workforce, many different devices, constantly changing cloud Conditions - Employee or partner, location, type of application accessed, device Controls - Allow or block, require MFAA, provide limited access, require password reset Administrators can build complex access rules - Complete control over data access

QUESTION 571

Bridge Protocol Data Unit (BPDU) guard

ANSWER

Managing superuser access - Administrator and Root - You don't want this in the wrong hands Store privileged accounts in a digital vault - Access is only granted from the vault by request - These privileges are temporary PAM advantages - Centralized password management - Enables automation - Manage access for each user - Extensive tracking and auditing

QUESTION 572

Loop prevention

ANSWER

Store files and access them Accessing information - Access control list - Group/user rights and permission Encryption can be built in

QUESTION 573

Dynamic Host configuration Protocol (DHCP) snooping

ANSWER

Topic

QUESTION 574

Media access control (MAC) filtering

ANSWER

- Certificates are based on the name of the server - A wildcard domain will apply to all server names in a domain - *.google.com -> something.google.com

QUESTION 575

Network appliances

ANSWER

SAN - Extension to an X.509 certificate - Lists additional identification information - Allow a certificate to support many different domains A single certificates can support many many websites

QUESTION 576

Network appliances: Jump servers

ANSWER

Developers can provide a level of trust - Applications can be signed by the developers The user's OS will examine the signature - Checks the developer's signature - Validates that the software has not been modified Is this a trusted software?

QUESTION 577

Network appliances: Proxy servers

ANSWER

Internal certificates don't need to be signed by a public CA - Your company is the only one going to user it - No need to purchase trust for devices that already trust you Build your own CA - Issue your own certificates signed by your own CA Install the CA certificate/trusted chain on all devices - They'll now trust any certificate signed by your company

QUESTION 578

Network-based intrusion detection system (NIDS)/network-based intrusion prevention system (NIPS)

ANSWER

You have to manage many devices How can you truly authenticate a device? - Put a certificate on the device that you signed Other business processes rely on the certificate - Access to the remote access VPN from authorized devices - Management software can validate the end device

QUESTION 579

Signature-based

ANSWER

Use cryptography in an email platform - You'll need public key cryptography Encrypting emails - Use a recipient's public key to encrypt Receiving encrypted emails - Use your private key to decrypt Digital signatures - Use your private key to digitally sign an email - Non-repudiation, integrity

QUESTION 580

Heuristic/behavior

ANSWER

Associate a certificate with a user - A powerful electronic ID card Use as an additional authentication factor - Limit access without the certificate Integrate onto smart cards - Use as both an physical and digital access card

QUESTION 581

Anomaly

ANSWER

The public key certificate that identifies the root CA (Certificate Authority) - Everything starts with this certificate The root certificate issues other certificates THIS IS A VERY IMPORTANT CERTIFICATE - Take all security precautions - Access to the root certificate allows for the creation of any trusted certificate Allow to this allow the attackers to create any type of certificate under your domain

QUESTION 582

Inline vs. passive

ANSWER

Owner of the certificate has some control over a DNS domain

QUESTION 583

HSM

ANSWER

- Additional checks have verified the certificate owner's identity - Browser used to show a green name on the address bar (BANK OF AMERICAN CORPORATION US) - Promote the use of SSL which is now outdated

QUESTION 584

Collectors

ANSWER

Privacy enhanced mail (PEM) - Format designed to transfer syntax for data structures - Binary format

QUESTION 585

Aggregators

ANSWER

A very common format - BASE64 encoded DER certificate - Generally the format provided by CAs - Supported on many different platforms ASCII format - Letters and numbers - Easy to email - Readable

QUESTION 586

Firewalls

ANSWER

Primarily a Windows X.509 file extension. - Can be encoded as binary DER format or as the ASCII PEM format. Usually contains a public key. -Private keys would be transferred in the .pfx file format. Common format for Windows Certificates. - Look for the .cer extension.

QUESTION 587

Web application firewall (WAF)

ANSWER

PKCS #12 - Public Key Cryptography Standards #12 .p12/.pfx file Transfer multiple certificates at one time This is a Container Format for many certificates - Often used to transfer a private and public key pair - The container can be password protected

QUESTION 588

NGFW

ANSWER

Public Key Cryptography Standards #7 .p7b ifle Stored in ASCII format Contains certificates and chain certificates - Private keys are not included in a .p7b file

QUESTION 589

Stateful

ANSWER

Topic

QUESTION 590

Stateless

ANSWER

Distribute the load - Then take the root CA offline and protect it Root CA -> Intermediate CA -> Issued certificates

QUESTION 591

Unified threat management (UTM)

ANSWER

Online Certificate Status Protocol - Provides scalability for OCSP checks The CA is responsible for responding to all client OCSP requests - This may not scale well Instead, have the certificate holder verify their own status - Status information is stored on the certificate holder's server OCSP status is "stapled" into the SSL/TLS handshake - Digitally signed by the CA

QUESTION 592

Network address translation (NAT) gateway

ANSWER

You're communicating over TLS/SSL to a server - How do you really know it's legitimate server? "Pin" the expected certificate or public key to an application - Compiled in the app or added at first run If the expected certificate or public key doesn't match, the application can decide what to do. - Shut down, show a message

QUESTION 593

Firewalls: Content/URL filter

ANSWER

Single CA - Everyone receives their certificates from one authority Hierarchical - Single CA issues certs to intermediate CAs Mesh - Cross-certifying CAs - Doesn't scale well Web-of-trust - Alternative to traditional PKI Mutual Authentication - Server authenticates to the client and the client authenticates to the server

QUESTION 594

Firewalls: Open-source vs. proprietary

ANSWER

Someone else holds your decryption keys - Your private keys are in the hands of a 3rd-party This can be a legitimate business arrangement - A business might need access to employee information - Government agencies may need to decrypt partner data

QUESTION 595

Firewalls: Hardware vs. software

ANSWER

Chain of trust - List all of the certs between the server and the root CA The chain starts with the SSL certificate - And ends with the Root CA certificate Any certificate between the SSL certificate and the root certificate is a chain certificate - Or intermediate certificate The web server needs to be configured with the proper chain - Or the end-user may receive an error

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials