Security+ Understanding Security Fundamentals: Crucial Review Questions for Certification Success

2024-03-25

Questions

  1. What are the three components of the CIA triad? Answer
  2. Why might an inactive CCTV camera be placed on the outside wall of a building? Answer
  3. What does confidentiality mean? Answer
  4. How can you control access of personnel to a data center? Answer
  5. What is the purpose of an air gap? Answer
  6. Name three main control categories. Answer
  7. Name three physical controls. Answer
  8. Following an incident, what type of control will be used when researching how the incident happened? Answer
  9. How do you know whether the integrity of your data is intact? Answer
  10. What is a corrective control? Answer
  11. What type of control is it when you change the firewall rules? Answer
  12. What is used to log in to a system that works in conjunction with a PIN? Answer
  13. What is the name of the person who looks after classified data? Who gives people access to the classified data? Answer
  14. When you use a DAC model for access, who determines who gains access to the data? Answer
  15. What is least privilege? Answer
  16. What access is granted by the Linux file permission of 764? Answer
  17. The sales team is allowed to log in to the company system between 9 a.m. and 10 p.m. What type of access control is being used? Answer
  18. Two people from the finance team are only allowed to authorize the payment of checks. What type of access control are they using? Answer
  19. What is the purpose of the defense in-depth model? Answer
  20. When someone leaves the company, what is the first thing you should do with their user account? Answer
  21. What do US companies that host websites in the US have to comply with if customers are based in Poland? Answer
  22. How can a company discover that its suppliers are using inferior products? Answer
  23. What is one of the most important factors between someone being arrested and their appearance before the judge in court? Answer
  24. Can you explain what the purpose of the CLOUD Act and COPOA is? Answer
  25. What is Stage C of Cloud Forensic Process 26? Answer

Answers

  1. The three components of the CIA triad are confidentiality, integrity, and availability. Back to question
  1. An inactive CCTV camera could be used as a deterrent since criminals would not know that it is inactive. Back to question
  1. Confidentiality means preventing other people from viewing the data; the best way to keep data confidential is to encrypt it. Back to question
  1. The best way to control access to a data center is to install a mantrap. Back to question
  1. The purpose of an air gap is to prevent data theft by removing physical connections between the device and network. Back to question
  1. The three control categories are managerial, operational, and technical. Back to question
  1. Three physical controls include lighting, cameras, and robot sentries. Back to question
  1. Detective controls are used when researching how the incident happened. Back to question
  1. Hashing is used to ensure data integrity; the hash value is measured before and after accessing data to ensure they match. Back to question
  1. Corrective controls are actions taken to recover from an incident, such as restoring data from a backup. Back to question
  1. When you change the firewall rules, you are implementing technical controls. Back to question
  1. A smart card, a CAC card, or a PIV card are used in conjunction with a PIN. Back to question
  1. In a MAC model, the custodian stores and manages the data, while the administrator grants access to the data. Back to question
  1. In a DAC environment, the data owner decides who has access to the data. Back to question
  1. Least privilege is the process of giving an employee minimal permissions to perform their job. Back to question
  1. The Linux permission of 764 gives the owner read, write, and execute access, the group read and write access, and other (users) read access. Back to question
  1. This is called rule-based access control. The access is applied to the whole department. Back to question
  1. The two people from finance are using role-based access control where a subset of a department is carrying out a subset of duties. Back to questions
  1. The defense-in-depth model has multiple layers, the purpose of which is to protect data and resources. If the outer layer fails, then the next layer should perform the protection. Many layers need to be broken through before gaining access to the data or resource. Back to questions
  1. When someone leaves the company, you should disable the account and reset the password so that it cannot be used. Back to questions
  1. The EU GDPR state that if a website that is hosted by someone in the US is accessed by someone from within the EU (which includes Poland), that website needs to be GDPR-compliant. Back to questions
  1. If a company puts a right to audit clause into a contract, it gives them the right to audit the supplier at any time. This way, the company can look at the company records and check the quality of the products and materials being used. Back to questions
  1. Chain of custody is a record of who has collected the evidence and provides a log of who has handled the data. The original data must be intact, and there must not be any break in the chain. Back to questions
  1. The US released The CLOUD Act so that they could obtain evidence from other countries for an FBI investigation. The UK government released the COPOA act to seek data stored overseas and give their law enforcement faster access to evidence held by providers. Back to questions
  1. In Stage C of Cloud Forensic Process 26, you ascertain the type of technology behind the cloud. Back to questions