Security+ Study Guide-01 Mastering Security Basics
Flashcard
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

14 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Management within your organization has defined a use case to support the confidentiality of data stored in a database. Which of the following solutions will BEST meet this need? Hashing, Disk redundancies, Encryption, Patching
Back
Encryption
Answer explanation
Encryption is the best choice to provide confidentiality of any type of information, including data stored in a database.
Hashing supports a use case of supporting integrity.
Disk redundancies provide resilience and increase availability.
Patching systems increases availability and reliability
2.
FLASHCARD QUESTION
Front
Apu manages network devices in his store and maintains copies of the configuration files for all the managed routers and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which use case is he MOST likely supporting?
Back
Supporting integrity
Answer explanation
He is most likely using a use case of supporting integrity. By verifying that the hashes are the same on the configuration files, he is verifying that he files have not changed.
Confidentiality is enforced with encryption, access controls, and steganography.
Encryption is a method of enforcing confidentiality, and it doesn't use hashes. Availability ensures systems are up and operational when needed.
3.
FLASHCARD QUESTION
Front
Which of the following is a cryptographic algorithm that will create a fixed-length output from a data file but cannot be used to re-create the original data file? Options: MD5, AES, IDS, SIEM
Back
MD5
Answer explanation
Message Digest 5 (MD5) is a hashing algorithm that creates a fixed-length, irreversible output. Hashing algorithms cannot re-create the original data file from just the hash.
Advanced Encryption Standard (AES) is an encryption algorithm, and you can re-create the original data file by decrypting it.
An intrusion detection system (IDS) is not a cryptographic algorithm but it is a detective control.
A security information and event management (SIEM) system provides centralized logging.
4.
FLASHCARD QUESTION
Front
What should be implemented to prevent outages in an e-commerce web server experiencing spikes in resource usage? Options: Elasticity, Scalability, Normalization, Stored procedures
Back
Elasticity
Answer explanation
Elasticity is the best choice because it allows the server to dynamically scale up or out as needed in response to high resource usage.
Scalability isn't the best answer because it is done manually, however, the high resource usage is random and manually adding resources can't respond to the random spikes quick enough.
Normalization refers to organizing tables and columns in a database to reduce redundant data and improve overall database performance.
Stored procedures are a group of SQL statements that execute as a whole and help prevent SQL injection attacks.
5.
FLASHCARD QUESTION
Front
An administrator recently installed an IDS to help reduce the impact of security incidents. Which of the following BEST identifies the control type of an IDS? Preventative, Physical, Deterrent, Detective
Back
Detective
Answer explanation
An intrusion detection system (IDS) is a detective control. It can detect malicious traffic after it enters a network.
A preventative control, such as an intrusion prevention system (IPS), prevent malicious traffic from entering the network. An IDS uses technology and is not a physical control.
Deterrent controls attempt to discourage a threat, but attackers wouldn't know if a system had an IDS, so the IDS can't deter attacks.
6.
FLASHCARD QUESTION
Front
Maggie works in the security section of the IT department. Her primary responsibilities are to monitor security logs, analyze trends reported by the SIEM, and validate alerts. Which of the following choices BEST identifies the primary security control she's implementing?
Back
Detective control
Answer explanation
Monitoring security logs, analyzing trend reports from a security information and event management (SIEM), and validating alerts from a SIEM are detective controls. Detective controls try to detect security incidents after they happened. A compensating control is an alternative control used when a primary security control is not feasible or is not yet deployed.
Preventative controls attempt to prevent incidents, but the scenario doesn't specifically describe any preventative controls.
A corrective control attempts to reverse the impact of a security incident after it has happened.
7.
FLASHCARD QUESTION
Front
A server in your network's DMZ was recently attacked. The firewall logs show that the server was attacked from an external IP address with the following socket: 72.52.230.233:6789. You want to see if the connection is still active. Which of the following would be BEST to use? Options: tracert, arp, netstat, dig
Back
netstat
Answer explanation
The netstat command can be sued to display a list of open connections, including both the IP address and the port (or a socket). None of the other commands display active connections.
The tracert command list the routers between two systems.
The arp command shows the contents of the Address Resolution Protocol (ARP) cache.
The dig command can be used on Linux system to query Domain Name System (DNS) servers.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
17 questions
Philippine History
Flashcard
•
University
20 questions
Erosion & Deposition Flashcard Review
Flashcard
•
KG - University
10 questions
Solving Linear Equations Game
Flashcard
•
12th Grade
17 questions
Biotechnology
Flashcard
•
12th Grade
8 questions
Attachment Theory Flashcard
Flashcard
•
12th Grade
18 questions
IAS 41 - Biological Assets
Flashcard
•
Professional Development
15 questions
Food Safety Flashcard Sec 3 G2
Flashcard
•
12th Grade
16 questions
April Fools Trivia
Flashcard
•
KG - University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development