An organization wants to ensure the integrity of compiled binaries in the production environment. Which of the following security measures would best support this objective?
A. Input validation
B. Code signing
C. SQL injection
D. Static analysis
Explanation: To ensure the integrity of compiled binaries in the production environment, the best security measure is code signing. Code signing uses digital signatures to verify the authenticity and integrity of the software, ensuring that the code has not been tampered with or altered after it was signed. Code signing: Involves signing code with a digital signature to verify its authenticity and integrity, ensuring the compiled binaries have not been altered. Input validation: Ensures that only properly formatted data enters an application but does not verify the integrity of compiled binaries. SQL injection: A type of attack, not a security measure. Static analysis: Analyzes code for vulnerabilities and errors but does not ensure the integrity of compiled binaries in production. Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 1.4 - Explain the importance of using appropriate cryptographic solutions (Code signing).
Which of the following security concepts is accomplished with the installation of a RADIUS server?
A. CIA
B. AAA
C. ACL
D. PEM
Explanation:
The installation of a RADIUS (Remote Authentication Dial-In User Service) server accomplishes AAA, which stands for Authentication, Authorization, and Accounting.
Authentication:
Verifies the identity of users or devices (e.g., through credentials).
Authorization:
Determines what resources or permissions the authenticated user has.
Accounting:
Tracks user activities and resource usage for auditing and billing.
RADIUS is a centralized protocol specifically designed to provide these three functions, often used for network access control (e.g., VPNs, Wi-Fi authentication).
Note:
The question likely has a typo ("AA" instead of "AAA"), but the intended answer is AAA, as RADIUS is a classic AAA protocol.
Analysis of Incorrect Options:
A. CIA (Confidentiality, Integrity, Availability):
This is the core triad of security goals. RADIUS supports these indirectly (e.g., by controlling access) but does not directly provide encryption (confidentiality) or data protection (integrity/availability).
C. ACL (Access Control List):
ACLs are rules that permit or deny traffic on network devices. RADIUS can dynamically assign ACLs based on user roles, but it is not synonymous with ACLs.
D. PEM (Privacy Enhanced Mail):
PEM is an outdated email encryption standard. It is unrelated to RADIUS.
Reference:
This aligns with Domain 3.0: Security Architecture, specifically identity and access management. RADIUS is defined in RFC 2865 and is widely used for AAA services in networks, as highlighted in CompTIA objectives and NIST guidelines.
The Chief Information Security Officer (CISO) at a large company would like to gain an understanding of how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?
A. Penetration test
B. Internal audit
C. Attestation
D. External examination
Explanation:
An external examination (or external audit) is conducted by an independent, third-party auditor to assess an organization's compliance with regulatory requirements, industry standards, or legal obligations. This process provides an objective evaluation of how the company's security policies and practices measure up against external benchmarks (e.g., GDPR, HIPAA, PCI DSS). The CISO can use the findings to identify gaps, ensure alignment, and demonstrate due diligence to regulators.
Why the others are incorrect:
A. Penetration test:
This is a simulated attack to identify technical vulnerabilities in systems. It focuses on technical security flaws, not policy comparisons to regulatory requirements.
B. Internal audit:
This is performed by the organization's own staff to evaluate controls and compliance. While useful, it lacks the independence and authority of an external examination for validating adherence to external regulations.
C. Attestation:
This is a formal statement (often from the vendor or internal team) asserting compliance. It is not an objective examination and may not provide the detailed comparison the CISO needs.
Reference:
This aligns with SY0-701 Objective 5.3 ("Explain processes for third-party risk assessment and management"). External audits/examinations are critical for verifying regulatory compliance, as emphasized in frameworks like ISO 27001 (which requires external certification) and regulatory guidelines (e.g., PCI DSS assessments). They provide unbiased insights into policy effectiveness versus external demands.
Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?
A. Availability
B. Non-repudiation
C. Integrity
D. Confidentiality
Explanation:
Availability is the security principle that ensures systems and data are accessible and operational when needed by authorized users. A Distributed Denial-of-Service (DDoS) attack is specifically designed to overwhelm a system's resources (like bandwidth, CPU, or memory) to make it unavailable to its intended users. Therefore, implementing a product to protect against DDoS attacks is a direct measure to defend and uphold the availability of a service or resource.
Why the other options are incorrect:
B. Non-repudiation:
This concept prevents an individual from denying having taken a specific action (e.g., sending a message or approving a transaction). It is typically achieved through digital signatures and auditing. DDoS protection does not relate to proving someone's actions.
C. Integrity:
This principle ensures that data is accurate, trustworthy, and has not been altered in an unauthorized way. While some attacks might combine DDoS with other threats, the core goal of a DDoS attack is to make a service unavailable, not to corrupt its data. Therefore, the primary concept being protected is availability, not integrity.
D. Confidentiality:
This principle ensures that information is not disclosed to unauthorized individuals, devices, or processes. DDoS attacks do not typically aim to steal or expose data; their goal is to disrupt service. Protection against DDoS does not directly safeguard confidentiality.
Reference:
This question tests the understanding of the CIA triad (Confidentiality, Integrity, Availability) in the context of common threats.
This falls under Domain 2.1: Explain the importance of security concepts in an enterprise environment of the CompTIA Security+ SY0-701 exam objectives.
DDoS attacks are a quintessential threat to availability, and mitigating them is a core function of maintaining business continuity, as outlined in various security frameworks.
Which of the following is the final step of the modem response process?
A. Lessons learned
B. Eradication
C. Containment
D. Recovery
Explanation:
The modern incident response process is typically cyclical, following a framework like the NIST SP 800-61 guide, which outlines these key phases:
Preparation
Detection & Analysis
Containment
Eradication
Recovery
Post-Incident Activity (Lessons Learned)
The Lessons Learned phase is the final step. In this phase, the team:
Reviews what happened during the incident.
Identifies what was done well and what could be improved.
Updates the Incident Response Plan (IRP), policies, and procedures based on these findings.
Implements new security controls to prevent a recurrence.
This final step is crucial for closing the loop and improving the organization's security posture for future incidents.
Why not B?
Eradication: This is the step where the root cause of the incident (e.g., malware, threat actor access) is removed from the environment. It occurs before recovery.
Why not C?
Containment: This is an early reactive step focused on limiting the damage of an ongoing incident. It occurs before eradication and recovery.
Why not D?
Recovery: This step involves restoring systems and operations to normal. While it occurs late in the process, it is followed by the final, formal post-incident analysis (Lessons Learned).
Reference:
Domain 4.4: "Given an incident, apply mitigation techniques or controls to secure an environment." The SY0-701 objectives require knowledge of the incident response lifecycle, with the final phase being a post-incident lessons learned meeting and report to improve future response efforts.
A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?
A. Off-the-shelf software
B. Orchestration
C. Baseline
D. Policy enforcement
Explanation:
Orchestration refers to the automated coordination and management of multiple tasks or systems to streamline complex processes. In this scenario, creating a script to automate account creation for a large number of end users is a perfect use case for orchestration. The script would:
Automate repetitive steps (e.g., user input, assigning permissions, adding to groups).
Ensure consistency and accuracy, reducing human error.
Save significant time compared to manual account creation.
Orchestration tools (e.g., Ansible, Puppet, or custom scripts) are commonly used for such administrative tasks to improve efficiency and reliability.
Why not the others?
A. Off-the-shelf software:
Pre-built software might handle account creation (e.g., identity management tools), but it may not be customizable for specific needs. Orchestration via scripting allows tailored automation.
C. Baseline:
A baseline is a standard configuration or state for systems, not a tool for automating tasks.
D. Policy enforcement:
This ensures compliance with rules (e.g., password policies), but it does not automate the account creation process itself.
Reference:
Domain 3.2: "Given a scenario, implement security hardening practices." Automation and orchestration are key for efficiently managing large-scale operations like user provisioning while maintaining security consistency. The SY0-701 objectives highlight orchestration as a method to reduce errors and enforce policies.
A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?
A. Set the maximum data retention policy.
B. Securely store the documents on an air-gapped network.
C. Review the documents' data classification policy.
D. Conduct a tabletop exercise with the team.
Explanation: A tabletop exercise is a simulated scenario that tests the effectiveness of a security incident response plan. It involves gathering the relevant stakeholders and walking through the steps of the plan, identifying any gaps or issues that need to be addressed. A tabletop exercise is a good way to validate the documentation created by the security manager and ensure that the team is prepared for various types of security incidents. References: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 6: Risk Management, page 2841. CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 6: Risk Management, page 2842.
An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?
A. Layer 4 firewall
B. NGFW
C. WAF
D. UTM
Explanation:
A WAF (Web Application Firewall) is specifically designed to protect web applications and services by monitoring, filtering, and blocking HTTP/HTTPS traffic between a web application and the Internet. It is the most appropriate solution for protecting a new web portal that customers access, as it defends against web-based attacks such as SQL injection, cross-site scripting (XSS), and other application-layer vulnerabilities that traditional firewalls might miss.
Why not A?
Layer 4 firewall: A Layer 4 firewall (traditional firewall) operates at the transport layer (TCP/UDP) and filters traffic based on IP addresses, ports, and protocols. It lacks the deep packet inspection capabilities needed to understand web application traffic and protect against application-layer attacks.
Why not B?
NGFW (Next-Generation Firewall): An NGFW includes additional features beyond traditional firewalls, such as application awareness, intrusion prevention, and deep packet inspection. While it can provide some web application protection, a dedicated WAF is more specialized and effective for securing web portals against sophisticated application-level threats.
Why not D?
UTM (Unified Threat Management): A UTM device combines multiple security features (firewall, IPS, antivirus, etc.) into a single platform. It may include WAF functionality, but it is often less specialized than a standalone WAF. For critical web services, a dedicated WAF is preferred for robust protection.
Reference:
Domain 3.2: "Given a scenario, implement secure network architecture concepts." The SY0-701 objectives emphasize the use of specialized security devices like WAFs to protect web applications. This aligns with best practices for securing customer-facing web portals against common web-based attacks.
A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select two).
A. Private
B. Confidential
C. Public
D. Operational
E. Urgent
F. Restricted
F. Restricted
Explanation:
For a critical government system, data classification is typically stringent and based on sensitivity and impact. The project information stored on a fileshare would most likely be classified as:
B. Confidential:
Government projects often involve sensitive information related to national security, defense, or critical infrastructure. "Confidential" is a standard classification tier for data whose unauthorized disclosure could cause damage to national security or government operations. This aligns with the context of a "critical system for the government."
D. Operational:
This classification refers to data essential for day-to-day operations. Project information for a critical system would include details necessary for development, deployment, and maintenance (e.g., design documents, configurations, timelines). Unauthorized access could disrupt operations or compromise system integrity.
Why not the others?
A. Private:
This typically pertains to personal data (e.g., employee or citizen information) protected by privacy laws. While the project might include private data, the overarching classification for government-critical project data is more likely "Confidential" or "Operational."
C. Public:
Public data is non-sensitive and intended for open access. Critical government system details are not public.
E. Urgent:
"Urgent" is not a standard data classification tier; it describes a priority level for actions or communications, not data sensitivity.
Reference:
Domain 5.2: "Explain the importance of data privacy and protection." The SY0-701 objectives cover data classification schemes (e.g., Confidential, Operational) used in government and enterprise contexts to ensure sensitive information is handled appropriately.
An external vendor recently visited a company's headquarters tor a presentation. Following the visit a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?
A. Government
B. Public
C. Proprietary
D. Critical
Explanation:
Why C is Correct:
Proprietary data refers to information that is owned by an organization and is central to its business operations, competitive advantage, or unique value. This includes trade secrets, intellectual property, internal processes, source code, and detailed architecture designs. The file described, containing "detailed architecture information and code snippets," is a classic example of proprietary data. It is confidential information that, if disclosed to competitors, could cause significant harm to the company that owns it.
Why A is Incorrect:
Government data is information that is classified or owned by a government entity (e.g., Top Secret, Secret, Confidential). Unless the company in question is a government contractor working on a classified project, this internal architecture and code would not be categorized as government data.
Why B is Incorrect:
Public data is information that has been deliberately released to the public or is intended for public consumption, such as marketing brochures or published annual reports. The sensitive nature of the file's contents clearly indicates it was never meant to be public.
Why D is Incorrect:
While this data is certainly critical to the company, "critical" is a descriptive term for the data's importance rather than a formal data classification type. Data classification schemes typically use labels like Public, Private, Proprietary, Confidential, and Internal. "Proprietary" is the most precise and technically correct classification for this type of sensitive intellectual property.
Reference:
This question falls under Domain 5.0: Governance, Risk, and Compliance (GRC), specifically covering data governance and classification. Understanding how to categorize data based on its sensitivity and value is a fundamental security practice.
| Page 15 out of 72 Pages |
| SY0-701 Practice Test | Previous |