Security+ (SY0-701) - Quiz Questions
Security+ (SY0-701) - Quiz Questions
1 Risk Management
2 Foundations of Cryptography
3 Physical Security
2 Which physical security item mitigates Bollard Security guards Access control
the ramming of vehicles into buildings? vestibule
While comparing previous and current Client devices are Client devices are Client devices are
network traffic patterns, you notice performing normal performing normal infected and are
6 new numerous DNS client queries for forward lookup DNS reverse lookup DNS attempting to
TXT records. What might this indicate? queries for Web sites. queries for IP remove the
addresses. infection.
8 Which mitigation can prevent network Disable link auto MAC filtering Intrusion detection
switching loops? negotiation sensor
12 Testing Infrastructure
It protects EU It protects EU
The General Data Protection It protects EU
citizens data based citizen's data
2 Regulation protects EU citizens data citizen's data based
on time, location, regardless of
under what conditions? on location
and data useless location
Which of the following is a
Operating
3 consideration in change Backout plans Employee Results
procedures
management?
14 Dealing with Incidents
Technical Detective Incorrect Answers: Preventative controls take steps to reduce the possibility of
threat incidents such as keeping antivirus databases up to date. Compensating
controls are used when it is not feasible to implement the preferred control
due to cost, time or complexity. Technical controls use technology to safeguard
assets, such as a firewall appliance.
Correct Answer: Mitigating risk means putting security controls in place to
eliminate or reduce the impact or realized threats.
Correct Answer: Multiple the Asset Value (AV) by the Exposure Factor (EF). The
Multiply the Multiply the Asset SLE reflects the cost associated with an asset being unavailable, such as a
Exposure Factor (EF) Value (AV) by the server going down for a period of time. The Single Loss Expectancy (SLE) is
by the risk severity Exposure Factor calculated by multiplying the Asset Value (AV) by the Exposure Factor (EF)
rating. (EF). where the EF is a percentage expressing how much of an asset’s value is loss
due to a negative event.
Incorrect Answers: The listed options do not reflect the values used to
calculate the SLE.
Multiply the
Multiply the Single Single Loss Correct Answer: Multiply the Single Loss Expectancy (SLE) by the Annual Rate
Loss Expectancy Expectancy (SLE) of Occurrence (ARO). The Annual Loss Expectancy (ALE) represents a cost
(SLE) by the Annual by the Annual related to the downtime of an asset over a one-year period. It is calculated by
Rate of Occurrence Rate of multiplying the Single Loss Expectancy (SLE) by the Annual Rate of Occurrence
(ARO). Occurrence (ARO).
(ARO). Incorrect Answers: The listed options do not reflect the values used to
calculate the ALE.
Quantitative Qualitative
Incorrect Answers: A risk heat map plots risks on a grid using colors to
represent severities; red is normally high severity and green is normally low
severity. A risk register is a centralized list of risks that includes details such as
a risk priority value, risk severity rating, mitigating controls, responsible person
and so on. Quantitative risk assessments use numbers (such as dollar values
and percentages) to calculate the impact realized threats can have on assets;
the goal is to determine if the cost of protecting an asset is less than the
projected annual cost of negative security incidents.
Correct Answer: Salting adds random data to passwords before they are
hashed thus making them much more difficult to crack.
Salting Salting
Salting Salting
Incorrect Answers: The listed items do not enhance the security of password
hashes. The password length does not affect the password hash; the hash is
always a fixed length. Key pinning is an older technique that associates a
certificate stored on a client device with a Web site. Multifactor authentication
(MFA) uses multiple factors for authentication, such as a username (something
you know) and a private key (something you have).
Correct Answer: Keyloggers come in the form of hardware and software. User
keystrokes are captured and can later be viewed by malicious actors.
Hardware security
module Keylogger
Incorrect Answers: A Common Access Card (CAC) is a single card used to
authenticate to many systems such as buildings, floors in a building, as well as
computer systems. Ransomware is malware that encrypts user data files and
demands a ransom payment in exchange for a decryption key. A Hardware
Security Module (HSM) is a tamper-proof device used for cryptographic
operations and the secure storage of cryptographic keys.
Correct Answer: Bollards are concrete or steel pillars embedded deep into the
ground near sensitive areas to prevent vehicle ramming.
Door locks Bollard Incorrect Answers: Security guards cannot effectively prevent vehicles from
ramming buildings. Access control vestibules (man traps) prevent a second
inner door from opening until the first outer door closes and locks. Door locks
prevent physical entry to a room but do not mitigate vehicles ramming
buildings.
Correct Answer: Air-gapping ensures that there is not a physical wired or
wireless connection to a sensitive network.
Reverse proxy Air-gapping Incorrect Answers: The listed items can be used for optimizing network
throughput (VLAN) and limiting network access (Layer 4 firewall, reverse
proxy), but these options do not ensure external network access to RNET-A is
impossible.
Correct Answer: Air flow is improved by installing blanking panels in racks
Air flow is where there is no equipment.
Air flow is improved
improved
Incorrect Answers: The listed items are not valid reasons for installing blanking
panels.
Correct Answer: Hot aisles are designed to pull warm exhaust air away from
equipment.
Blanking panels Hot aisles
Incorrect Answers: The listed items are not focused on removing warm
exhaust air from server rooms.
Correct Answer: User home directory on the Linux server. SSH public keys
Root directory on User home must be stored on the server in the user home directory in a file called
the Windows host directory on the “authorized_keys”.
Linux server
Incorrect Answers: None of the listed options specifies the correct location of
the SSH public key.
Correct Answer: Access-based Access Control (ABAC) allows resource access
based on user, device and resource attributes.
MAC ABAC Incorrect Answers: Role-based Access Control (RBAC) uses roles, which are
collections of related permissions, to control resource access. Discretionary
Access Control (DAC) allows the data custodian to set permissions in
accordance with policies set forth by the data owner. Mandatory Access
Control (MAC) labels resources and ties security clearance levels to specific
labels to allow resource access.
Correct Answer: PS1. Microsoft PowerShell scripts normally use a .PS1 file
extension.
SH PS1
Incorrect Answers: Batch files use a .BAT extension, Python scripts use a .PY
extension and shell scripts often use the .SH file extension.
Correct Answer: The sudo command prefix allows non-root users to run
privileged commands as long as they are granted this permission in the
sudoers file.
Disable SELinux Use the sudo
enforcing mode command
Incorrect Answers: The chmod command is used to set Linux file system
permissions. Logging in as root is not recommended because it is such a
powerful account. Security Enhanced Linux (SELinux) is not causing permission
denied messages in this scenario.
Correct Answer: The ssh-keygen command creates an SSH public and private
key pair.
ssh-keygen ssh-keygen
Incorrect Answers: The listed commands do not create key pairs. md5sum and
sha256sum are used to generate file hashes. The ssh command allows remote
management of any device with an SSH daemon over an encrypted connection.
Correct Answer: The ifconfig command shows Linux network interfaces and IP
address information.
ifconfig ifconfig Incorrect Answers: The dig command in Linux can be used to test and
troubleshoot DNS name resolution. The name server lookup (nslookup)
command is used to test and troubleshoot DNS name resolution in both
Windows and Linux. Ipconfig is used to view network interface and IP address
information in Windows.
WEP WEP
Incorrect Answers: Wi-Fi Protected Access 3 (WPA3) is a current wireless
network security protocol. Remote Access Dial-in User Service (RADIUS)
authentication uses a central authentication server to service authentication
requests from RADIUS clients. Disabling DHCP is a hardening technique
because it makes it more difficult for attackers to get on an IP network.
Correct Answer: Server PKI certificate. HTTP Web sites require a server PKI
certificate to secure communications and normally use TCP port 443.
Enable security Server PKI
protocols that certificate
precede TLS v1.0
Enable security Server PKI
protocols that certificate Incorrect Answers: Client PKI certificates are not required to enable an HTTPS
precede TLS v1.0 Web application. TLS v1.2 should be configured on clients and servers as the
network security protocol used for HTTPS; SSL v3.0 and TLS v1.0 are
deprecated and should not be used.
Correct Answer: Zero-days are security flaws not yet known by vendors.
Zero-day Zero-day Incorrect Answers: The listed flaw types do not reflect security problems
unknown to the vendor.
Correct Answer: Brute-force attacks use automation tools to try every possible
combination of letters, numbers and symbols to crack passwords.
Offline Brute-force Incorrect Answers: Dictionary attacks use dictionary word or phrase files to try
them in combination with a username in an attempt to crack user passwords.
Password spraying blasts many accounts with a best-guess common password
before trying a new password; this is slower (per-user account basis) than
traditional attacks and is less likely to trigger account lockout thresholds.
Offline password attacks use an offline copy of passwords for cracking
passwords.
Client devices are
Client devices are infected and are Correct Answer: Client devices are infected and are attempting to discover a
infected and are attempting to command and control server. Client devices normally query IPv4 A records or
attempting to discover a IPv6 AAAA records to resolve FQDNs to IP addresses. Clients querying DNS TXT
discover a command command and records is abnormal.
and control server. control server.
Incorrect Answers: The listed reasons are invalid in this scenario.
Correct Answer: A network intrusion prevention system can not only detect
but also be configured to stop suspicious activity.
Network intrusion
Network intrusion prevention
detection system Incorrect Answers: Layer 4 firewalls are packet filtering firewalls which do not
system detect or prevent suspicious activity. Reverse proxy servers map public IP
addresses and ports to internal servers to protect their true identities.
Intrusion detection systems only detect and report, log, or notify of suspicious
activity.
Correct Answer: RAID level 1 (disk mirroring) writes each file to all disks in the
mirrored array.
RAID 6 RAID 1 Incorrect Answers: RAID 0 (disk striping) writes data across an array of disks to
improve performance. RAID 5 (disk striping with distributed parity) writes data
across an array of disks but also write parity (error recovery information)
across the disks in the array, thus providing a performance improvement in
addition to resiliency against a single failed disk in the array. RAID 6 uses at
least 4 disks for striping and stores 2 parity stripes on each disk in the array;
this allows for a tolerance of 2 disk failures within the array.
Correct Answer: Order laptops with TPM chips and configure BitLocker disk
encryption. A Trusted Platform Module (TPM) chip in a computer is used to
Order laptops with Order laptops secure the integrity of the machine boot process and to store disk volume
TPM chips and with TPM chips encryption keys.
configure BitLocker and configure
disk encryption. BitLocker disk
encryption.
Incorrect Answers: A Hardware Security Module (HSM) is not a chip installed
within a computer; it is a tamper-resistant device used for cryptographic
operations and the storage of encryption keys. Encrypting File System (EFS) file
encryption is tied to the user account, not tied to the machine.
Correct Answer: Symmetric encrypting uses a single “secret” key for encrypting
and decrypting.
SHA256 Symmetric
Incorrect Answers: Asymmetric keys (public and private keys) are used for
security in the form of encryption, digital signatures and so on; the recipient
public key is used to encrypt and the related private key is used to decrypt. RSA
is a public and private key pair cryptosystem. SHA256 is a hashing algorithm.
Correct Answer: With Cipher Feedback Mode (CFB), each previous block
ciphertext is encrypted and fed into the algorithm to encrypt the next block.
OFB CFB
Incorrect Answers: Electronic Code Book (ECB), given the same plaintext,
always results in the same ciphertext and is thus considered insecure. Cipher
Block Chaining (CBC) is similar to ECB except that it used a random Initialization
Vector (IV). Output Feedback Mode (OFB) uses a keystream of bits to encrypt
data blocks.
Sender private key Your private key Correct Answer: Your private key. Recipient private keys decrypt network
messages (the recipient’s related public key encrypts network messages).
Incorrect Answers: The listed keys are not used for decryption.
Correct Answer: Sender public key. Verifying digital signatures is done using
Sender private key Sender public key the sender’s public key (the sender’s private key creates the digital signature).
Incorrect Answers: The listed keys are not used to verify a digital signature.
Correct Answer: Wildcard certificates allow a single certificate tied a DNS
domain to be used by hosts within subdomains.
Acquire an extended Acquire a
validation certificate wildcard Incorrect Answers: Using self-signed or public certificates for each Web site
certificate requires more effort than using a wildcard certificate. Extended validation
certificates require the certificate issuer to perform extra due diligence in
ensuring that the certificate request is legitimate.
7 4 Correct Answer: Port numbers apply to the OSI model transport layer (layer 4).
Incorrect Answers: The listed OSI layers are not related to port numbers.
Correct Answer: Wi-Fi Protected Setup (WPS) pairs Wi-Fi devices using a PIN.
TKIP WPS
Incorrect Answers: The listed Wi-Fi standards do not pair Wi-Fi devices using a
PIN.
Use NFC tags that Use NFC tags that Correct Answer: Use NFC tags that contain Wi-Fi connection information. With
contain Wi-Fi contain Wi-Fi a smartphone app, you can write data to a physical NFC tag that can be
connection connection purchased inexpensively. Users with NFC-enabled smartphones can retrieve
information. information. NFC tag information such as Wi-Fi connection details.
Incorrect Answers: The listed options are not as convenient as using NFC tags.
Correct Answer: Bluetooth Class 2 devices have a range of approximately 30
150 feet 30 feet feet.
Incorrect Answers: The listed ranges are not valid.
-30 dBm -30 dBm Correct Answer: A -30 dBm wireless signal strength is considered excellent.
Incorrect Answers: The listed wireless signal strengths are sub-standard.
Incorrect Answers: The listed security configurations would not result with the
Web page presented when connection to a public Wi-Fi hotspot.
Correct Answer: Private clouds are owned and used by a single organization.
Private Private Incorrect Answers: Public clouds are accessible by anybody over the Internet.
Hybrid clouds combine Public and Private clouds. Community clouds serve the
specific cloud computing needs of a group of tenants, such as for government
cloud usage.
PaaS IaaS
Incorrect Answers: Software as a Service (SaaS) refers to end-user productivity
software running in the cloud, Security as a Service (SECaaS) refers to cloud
security services, and Platform as a Service (PaaS) refers to database and
software development platforms, all of which do not place the responsibility of
virtual machine patching on the cloud tenant.
Correct Answer: A Cloud Access Security Broker (CASB) sits between users and
cloud services to enforce organizational security policies.
IaaS CASB
Incorrect Answers: Cloud Service Providers (CSPs) host cloud services. Service
Level Agreements (SLAs) guarantee cloud service uptime. Infrastructure as a
Service (IaaS) includes storage, network and virtual machines. IaaS virtual
machine software patching is the responsibility of the cloud tenant.
HSM PLC
HSM PLC
Incorrect Answers: Service Level Agreements (SLAs) guarantee uptime for
services such as those offered in the cloud. An Industrial Control System (ICS)
refers to a collection of computerized solution used for industrial process
control. A Hardware Security Module (HSM) is a tamper-resistant device used
for cryptographic operations and the storage of cryptographic keys.
Correct Answer: Zigbee is designed to make connecting smart home devices
together simple and convenient, and it does not use TCP/IP.
IoT Zigbee
Incorrect Answers: An Industrial Control System (ICS) refers to a collection of
computerized solution used for industrial process control. Programmable Logic
Controllers (PLCs) are used extensively in manufacturing and various industries
such as oil refining, electricity and water treatment. Internet of Things (IoT)
refers to devices that connect to and send and receive data over the Internet.
Correct Answer: The maximum proposed speed for 5G is 10 Gbps.
50 Gbps 10 Gbps
Incorrect Answers: The listed transmission rates are incorrect.
Correct Answer: 4G cell towers have an approximate range of 6 miles.
20 miles 6 miles
Incorrect Answers: The listed distances are incorrect.
Correct Answer: Elliptic Curve Cryptography (ECC) uses small keys to achieve
strong crypto strength.
SHA256 ECC
Incorrect Answers: RSA keys are larger than ECC keys. MD5 and SHA256 do not
use keys; they are hashing algorithms.
Correct Answer: Sideloading refers to installing mobile device apps directly
from installation files, without using an app store.
Sideloading Sideloading
Incorrect Answers: Geotagging adds geographic metadata (such as GPS
coordinates) to files, such as photos taken with a smart phone. Geofencing
uses geographical location to control app access. Registering refers to linking a
mobile device to a centralized Mobile Device Management (MDM) system.
Correct Answer: DNS Security (DNSSEC) digitally signs DNS zone records.
Clients validate the signature to ensure DNS responses are authentic.
HTTPS DNSSEC
Incorrect Answers: IP security (IPsec) is a suite of network security protocols
that can be used to encrypt and authenticate network messages. Public Key
Infrastructure (PKI) is a hierarchy of digital security certificates. Hyper Text
Transfer Protocol Secure (HTTPS) encrypts HTTP network transmissions
between clients and servers.
HTTPS SNMP
Incorrect Answers: DNS Security (DNSSEC) digitally signs DNS zone records.
Clients validate the signature to ensure DNS responses are authentic. IP
security (IPsec) is a suite of network security protocols that can be used to
encrypt and authenticate network messages. Hyper Text Transfer Protocol
Secure (HTTPS) encrypts HTTP network transmissions between clients and
servers.
Correct Answer: A Cross-site Request Forgery (CSRF) attack occurs when the
attacker takes over an existing authenticated user session and issues
commands to the server that appear to originate from the authenticated user.
Correct Answer: In the client Web browser. A Cross-site Scripting (XSS) attack
occurs when a victim views a Web page where a malicious user has injected
On the Web server In the client Web malicious code, normally written in JavaScript, that executes in the victim Web
operating system browser browser.
Incorrect Answers: The listed locations do not correctly identity where XSS
attacks execute.
Correct Answer: The HTTPOnly flag ensures that client Javascript cannot access
the cookie which can help mitigate cross-site scripting (XSS) attacks.
Domain HTTPOnly
MOA NDA
Incorrect Answers: A Memorandum of Understanding (MOU) consists of a
general agreement with broad terms between 2 parties. An Inter-connection
Security Agreement (ISA) defines how 2 parties will securely connect their
networks and systems together. A Memorandum of Agreement (MOA) consists
of details terms agreed upon by two parties in a business arrangement.
Correct Answer: All of the above covers the full grasp of what we can scan for
All of the above All of the above vulnerabilities. Incorrect Answer: This answer doesn't cover the full grasp of
vulnerabilities we can scan.
Correct Answer: All answers are correct options for social engineering attacks.
Impersonation All of the above
Incorrect Answer: This answer doesn't cover the full scope of possibilities for
social engineering attacks.
Correct Answer: A Non-disclosure Agreement (NDA) is used to ensure that any
sensitive data will not be disclosed to unauthorized parties.
MOA NDA Incorrect Answers: An Interconnection Security Agreement (ISA) defines how
to secure communications when linking organizations, sites, or government
agencies together. A Memorandum of Understanding (MOU) defines general
terms of agreement between two parties, where a Memorandum of
Understanding (MOA) defines granular contractual details between two
It protects EU parties.
It protects EU
citizen's data
citizen's data Correct Answer: No matter the location in the world, the General Data
based on location
regardless of Protection Regulation protects EU citzens data.
but regardless of Incorrect Answer: This is not the correct answer.
location
time and data use.
Correct Answer: Backout plans are something important to consider when you
Company attitude Backout plans are looking at change management.
Incorrect Answer: This is not the correct answer.
Correct Answer: An Incident Response Plan (IRP) is a plan created to deal with
incidents as they occur such as enabling incident containment and ultimately
eradication.
Incident response
Backup plan plan
Incorrect Answers: A Disaster Recovery Plan (DRP) is specific to a business
process, IT system, or data, and it focuses on recovering from a security
incident as quickly as possible. A Business Continuity Plan (BCP) is a document
specifying general terms organizations will take to ensure continued business
operations. A backup plan is not a standard accepted term in this context.
PLC SOAR
Incorrect Answers: Security Information Event Management (SIEM) is a
solution that ingests activity data from numerous sources in order to detect
indicators of compromise. An Industrial Control System (ICS) is a collection of
computerized solutions used for industry, such as with manufacturing, oil
refining, or power plants. A Programmable Logic Controller (PLC) is a network
device that connects with some kind of industrial component such as robotics,
sensors, gauges, values, centrifuges, and so on.
Correct Answer: The Recovery Point Objective (RPO) specifies, in time, the
maximum tolerable amount of data loss due to a negative occurrence.
RTO RPO
Incorrect Answers: The Service Level Agreement (SLA) is a document detailing
guaranteed service uptime. A Hardware Security Module (HSM) is a tamper-
resistant device used for cryptographic operations. The Recovery Time
Objective (RTO) specifies, in time, the maximum amount of tolerable downtime
for a business process or IT system.
Reference Episode
7.21 Firewalls