Sec+ - Study #1 Flashcards

(61 cards)

1
Q

A security team sets up a system that immediately sends an email alert whenever unauthorized login attempts are detected, without any manual monitoring. What is this process called?

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

While working from a coffee shop, a user connects to the public Wi-Fi and tries to log in to their company’s email. Unbeknownst to them, an attacker is secretly intercepting and potentially altering the traffic between the user and the email server. What type of attack is occurring?

A

On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

would allow members of one organization to authenticate
using the credentials of another organization

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a formal document where
both sides agree to a broad set of goals and objectives associated with the partnership.

A

MOA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

happens when two or more processes try to use the same resource at the same time, and the outcome depends on the order of execution. Attackers can exploit this timing flaw to bypass security checks or gain unauthorized access.

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

refers to the trustworthiness of data. A digital signature allows
the recipient to confirm that none of the data has been changed since the digital signature was created

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A plan that ensures a business or organization can keep running critical functions during and after a disruption (like a cyberattack, disaster, or outage).

A

Continuity of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security method where each individual record in a database (like a single customer’s file) is encrypted separately, instead of encrypting the whole database or table at once.

A

Record level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

writes data to a temporary journal before writing the
information to the database. If power is lost, the system can recover the last transaction from the journal when power is restored.

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

provides a centralized management system for all mobile devices

A

MDM (Mobile Device Manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An IT help desk is using automation to improve the response time for security events. What would this be considered?

A

Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of setting up and allocating the necessary resources (like servers, storage, network, or user accounts) so that systems, applications, or users can function properly.

A

Resource Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The latest Wi-Fi security standard that improves protection by using stronger encryption, blocking password-guessing attacks, and adding forward secrecy so past data stays safe even if the password is exposed later.

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

uses a centralized authentication server, and this allows all users to
use their corporate credentials during the login process.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access control model that uses user, resource, action, and environment attributes to decide access.

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

identifies and documents the risks associated with each
step of a project plan

A company’s ___ lists “Data breach from phishing attack” as a high-likelihood, high-impact risk, with mitigation steps like employee training and stronger email filtering to reduce the chance of compromise.

A

Risk Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of cyberattack where an attacker inserts malicious code into an input field (like a login form) to manipulate a database, steal data, or bypass authentication.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When an attacker intercepts and reuses valid data to gain unauthorized access or perform malicious actions.

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A system used to monitor and control industrial processes such as power plants, water treatment, manufacturing, and utilities

A

SCADA (Supervisory Control and Data Acquisition)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Installing apps from unofficial sources instead of the official app store.

A

Side loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Isolated processor that securely stores and processes sensitive data on a device.

A

Secure enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a company, one employee’s role is to make sure customer data is accurate, consistent across systems, and handled according to company rules. What is this role called?

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

____ protects all data saved on a storage drive, but it does
not provide any data protection for messages or attachments sent between
email servers.

Think of it like locking your laptop with a strong key — everything on the drive is safe if someone steals it, but emails sent over the internet are still exposed unless separately encrypted.

A

Full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrator wants to separate the HR and IT departments onto different logical networks while using the same physical switch. What should the administrator configure?

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
An administrator must connect to internal firewalls and switches, but the company requires all access to go through one secure gateway first. What should the administrator use?
Jump Server
26
A server that acts as an intermediary between users and the internet. It hides internal IPs, filters traffic, and can cache content for performance.
Proxy Server
27
A network engineer wants all logins to the company’s switches and Wi-Fi access points to be verified against a central server instead of local device accounts. What framework should be used to manage this authentication, authorization, and accounting?
AAA (Authentication, Authorization, and Accounting)
28
During a network audit, an administrator notices that usernames and passwords for internal services can be captured in plain text by anyone monitoring the network traffic. What security issue does this indicate?
Insecure protocols
29
“Doors” on a computer that let different types of internet traffic in and out. Each ___ is for a specific service.
Ports
30
is a business decision that places the responsibility of the risky activity on the organization itself.
Risk Acceptance
31
A web server shows unusual log entries, and an intrusion prevention system reports multiple exploit attempts. To stop further compromise while investigating, what should the system administrator do next?
Disconnect the web servers from the network to stop further compromise while investigating and preparing eradication.
32
Official confirmation that a system, process, or data meets required standards or policies.
Attestation
33
A company wants to ensure that all data sent between its branch offices over the internet is encrypted and cannot be tampered with during transit. Which protocol suite should be used to secure these IP communications?
IPsec
34
A way of combining multiple hard drives so they work together for speed, reliability, or both
RAID (Redundant Array of Independent/Inexpensive Disks)
35
A coffee shop upgrades its Wi-Fi to a newer standard that uses SAE for stronger authentication and offers better protection on open networks. Which Wi-Fi security protocol is being used?
WPA3
36
commonly used for managing logins to network devices (like routers, switches, VPNs, and Wi-Fi access points), so users don’t need separate accounts on each device.
RADIUS
37
A government lab stores sensitive research data on computers that are never connected to the internet or any external networks. What security method is being used to protect the data?
Air gap
38
describes the process of hiding data from others by embedding the data inside of a different media type?
Obfuscation
39
A cloud-based security model that combines networking (like SD-WAN) and security services (like firewalls, secure web gateways, and zero trust) into one service delivered from the cloud
SASE (Secure Access Service Edge)
40
A security solution that combines multiple tools — like firewall, intrusion detection/prevention, antivirus, content filtering, and VPN — into a single device or service.
UTM (Unified Threat Management)
41
generates a unique “fingerprint” of the files. If even one bit changes, the hash value will change. This is the best forensic method to prove integrity.
Hashing
42
a formal process used to control and manage any changes to hardware, software, or any other part of the IT infrastructure
Change management
43
An attacker captures valid data (like a login token or network packet) and reuses it later to trick a system into allowing an action again (e.g., logging in or approving a transaction).
Replay Attack
44
It’s security software installed on a single computer (host) that watches what’s happening on that device. It can block suspicious activity in real-time—like stopping malware, blocking bad network traffic, or preventing unauthorized changes. Think of it like a security guard stationed inside a single computer, watching everything that happens and blocking suspicious activity immediately.
HIPS (Host-based Intrusion Prevention System)
45
It’s like a phone book for computers. ___ helps systems look up and manage usernames, passwords, and other information stored in a central directory (like Active Directory).
LDAP (Lightweight Directory Access Protocol)
46
is a protocol used to monitor and manage network devices like routers, switches, servers, and printers over a network. Think of it like a remote control and dashboard for your network devices — you can check their status, get alerts, and change settings without being physically at the device.
SNMP (Simple Network Management Protocol)
47
is the process of actively gathering detailed information about a system or network to find potential targets, like usernames, network shares, or services. It usually comes after scanning and before launching an attack
Enumeration
48
A company installs software on a laptop that detects suspicious processes and blocks them before they can run. What type of security system is this?
HIPS (Host-based Intrusion Prevention System)
49
A dedicated, isolated processor on modern devices (like iPhones or Macs) that can generate true random numbers, perform real-time encryption, and securely store cryptographic keys. Perfect for the app’s needs.
Secure Enclave
50
A security analyst finds an unauthorized Wi-Fi device connected near the office network that could be used to capture employee credentials. What is this device called? Think of it like someone setting up a secret doorway into a building — it allows outsiders to enter the network without permission.
Rogue Access Point
51
A specialized chip on a computer that securely stores cryptographic keys, passwords, and digital certificates. It helps with tasks like disk encryption, secure boot, and device authentication.
TPM (Trusted Platform Module)
52
Access is based on security labels on objects and clearance levels of users; enforced by the system.
Mandatory Access Control (MAC)
53
the process of hiding information within another document.
Steganography
54
Expected number of times a specific risk or threat will happen in one year.
ARO (Annualized Rate of Occurrence)
55
The expected financial loss if a specific threat happens once.
SLE (Single Loss Expectancy)
56
A risk management metric that estimates the expected monetary loss from a threat over a year.
ALE (Annualized Loss Expectancyl
57
is the process of actively gathering detailed information about a target system, network, or application after initial scanning or reconnaissance.
Enumeration
58
a control system architecture used to monitor and control industrial processes—often spread over large geographic areas. It collects data from sensors and equipment in real time, then sends commands back to control them. Ex. “The city’s water supply is managed through a __ that monitors pumps and reservoir levels in real time.”
SCADA
59
a collection of control systems and devices—like sensors, controllers, and computers—used to monitor and automate industrial processes. at the water treatment facility continuously monitors pressure levels and adjusts valve operations automatically to ensure a consistent water supply.
ICS
60
The process of recording events, transactions, or changes in a system so that actions can be tracked, reviewed, or recovered if something goes wrong. The Linux file system uses __ to record changes before applying them, allowing it to recover quickly if the system unexpectedly shuts down.
Journaling
61