If you're planning to take the SY0-501 version of the Security+ exam, you may run across questions with subtle word choices. For example, a question could have one answer correct. However, a subtle change in a phrase in a question would make that answer incorrect.
Consider this question that was recently added to the gcgapremium.com site:
Q. Your organization is planning to implement SELinux in enforcing mode as a mandatory access control (MAC) model. Which of the following roles will specify the subjects that can access certain data objects?
A. Administrator
B. System
C. Owner
D. User
Do you know the answer? More, do you know why the correct answer is correct and why the incorrect answers are incorrect? Check out the answer and explanation here.
Friday, September 21, 2018
Monday, August 13, 2018
Security+ and Symmetric Encryption Concepts
Symmetric encryption is a type of encryption that uses a single key to encrypt and decrypt data. If you're planning to take the SY0-501 exam, you should have a basic understanding of cryptography concepts such as cipher types and cipher modes.
Can you answer this Sample Security+ practice test question?
Q. Which of the following is a symmetric encryption algorithm that encrypts data 1 bit at a time?
A. Block cipher
B. Stream cipher
C. AES
D. DES
E. MD5
Check out the answer and full explanation here.
Can you answer this Sample Security+ practice test question?
Q. Which of the following is a symmetric encryption algorithm that encrypts data 1 bit at a time?
A. Block cipher
B. Stream cipher
C. AES
D. DES
E. MD5
Check out the answer and full explanation here.
Monday, July 16, 2018
Russian Hacking
Russian hacking was exposed in a detailed indictment of 12 Russians by the US Department of Justice (DoJ). While reading through it I was intrigued at how the indictment laid out methods that the Russians used in clear and simple English.
Reading through the indictment, it gave all the classic indications of an advanced persistent threat (APT), the indictment never said so. Instead it indicated the attacks came from Units 26165 and 74455, which are part of a Russian military agency called the Main Intelligence Directorate of the General Staff. This is commonly abbreviated as GRU.
Read more about it here.
Reading through the indictment, it gave all the classic indications of an advanced persistent threat (APT), the indictment never said so. Instead it indicated the attacks came from Units 26165 and 74455, which are part of a Russian military agency called the Main Intelligence Directorate of the General Staff. This is commonly abbreviated as GRU.
Read more about it here.
Monday, June 11, 2018
Digital Certificates and Security+
Are you planning to take the either the SY0-501 or the SY0-401 version of the Security+ exam?
If so, make sure you understand some basics about certificates, including what they contain.
As an example, see if you can answer this sample Security+ question.
Q. You are examining a certificate received from a web server used for secure transport encryption. Which of the following items will you be able to see in the certificate. (Choose TWO.)
A. The server’s private key
B. The CAs public key
C. The OID
D. The server’s public key
E. The CSR
See if you're correct (and view the full explanation) here.
If so, make sure you understand some basics about certificates, including what they contain.
As an example, see if you can answer this sample Security+ question.
Q. You are examining a certificate received from a web server used for secure transport encryption. Which of the following items will you be able to see in the certificate. (Choose TWO.)
A. The server’s private key
B. The CAs public key
C. The OID
D. The server’s public key
E. The CSR
See if you're correct (and view the full explanation) here.
Monday, June 4, 2018
Security+ Questions with 8 Possible Answers
Are you preparing for the CompTIA SY0-501 Security+ exam?
If so, you might like to that you may see more than just 4 possible answers.
Some people are reporting that they're seeing as many as 6 or 8 multiple choice answers in multiple choice questions. And you are typically required to pick multiple correct answers.
Check out this practice test question as an example:
Q. You suspect that an attacker is performing a reconnaissance attack against servers in your organization’s DMZ. The attacker is attempting to gather as much information as possible on these servers. You decide to check the logs of these servers to determine if the attacker is attempting a banner grabbing attack. Which of the following commands MOST likely indicate that the attacker is launching a banner grabbing attack? (Select FOUR.)
A. netcat
B. ipconfig
D. ping
E. arp
F. grep
G. tcpdump
H. nmap
I. telnet
Do you know the answers? Check out this blog post to see if you're correct.
If so, you might like to that you may see more than just 4 possible answers.
Some people are reporting that they're seeing as many as 6 or 8 multiple choice answers in multiple choice questions. And you are typically required to pick multiple correct answers.
Check out this practice test question as an example:
Q. You suspect that an attacker is performing a reconnaissance attack against servers in your organization’s DMZ. The attacker is attempting to gather as much information as possible on these servers. You decide to check the logs of these servers to determine if the attacker is attempting a banner grabbing attack. Which of the following commands MOST likely indicate that the attacker is launching a banner grabbing attack? (Select FOUR.)
A. netcat
B. ipconfig
D. ping
E. arp
F. grep
G. tcpdump
H. nmap
I. telnet
Do you know the answers? Check out this blog post to see if you're correct.
Tuesday, May 29, 2018
Baseline Deviations and Security+
Are you planning to take the SY0-401 or SY0-501 Security+ exam?
If so, you should understand how baselines can be used to identify changes or deviations.
See f you can answer this sample practice test question.
Q. Network administrators have identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer.
You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of applications from the master image, you verify this application is very likely the problem.
What allowed you to make this determination?
A. Least functionality
B. Sandbox
C. Blacklist
D. Integrity measurements
See if you're correct (and view a full explanation here).
If so, you should understand how baselines can be used to identify changes or deviations.
See f you can answer this sample practice test question.
Q. Network administrators have identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer.
You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of applications from the master image, you verify this application is very likely the problem.
What allowed you to make this determination?
A. Least functionality
B. Sandbox
C. Blacklist
D. Integrity measurements
See if you're correct (and view a full explanation here).
Monday, May 21, 2018
Security+ Personnel Management Policies
Are you planning to take the Security+ exam? If so, you might like to review some common personnel management policies.
See if you can answer this sample question.
Q. After a major data breach, Lisa has been tasked with reviewing security policies related to data loss. Which of the following is MOST closely related to data loss?
A. Clean desk policy
B. Legal hold policy
C. Job rotation policy
D. Background check policy
Read the full explanation (and see if you're correct) here.
See if you can answer this sample question.
Q. After a major data breach, Lisa has been tasked with reviewing security policies related to data loss. Which of the following is MOST closely related to data loss?
A. Clean desk policy
B. Legal hold policy
C. Job rotation policy
D. Background check policy
Read the full explanation (and see if you're correct) here.
Tuesday, May 15, 2018
Common Malware Names and Security+
Are you planning to take the SY0-501 Security+ exam? If so, you might like to review some information on malware names.
Check out this sample Security+ practice test question that was recently added to the Extras quiz for the online SY0-501 practice test questions.
Q. You are troubleshooting a computer that is displaying erratic behavior. You suspect that malicious software was installed when the user downloaded and installed a free software application. You want to identify the name of the malware and you run the following netstat command from the command prompt:
C:\WINDOWS\system32>netstat -nab > netstat.txt
After opening the text file you see the following information.
Based on the output, what type of malware was most likely installed on the user’s computer?
A. Worm
B. Logic bomb
C. Ransomware
D. RAT
E. Crypto-malware
F. No malware is indicated
Check out the answer and full explanation here.
Check out this sample Security+ practice test question that was recently added to the Extras quiz for the online SY0-501 practice test questions.
Q. You are troubleshooting a computer that is displaying erratic behavior. You suspect that malicious software was installed when the user downloaded and installed a free software application. You want to identify the name of the malware and you run the following netstat command from the command prompt:
C:\WINDOWS\system32>netstat -nab > netstat.txt
After opening the text file you see the following information.
Based on the output, what type of malware was most likely installed on the user’s computer?
A. Worm
B. Logic bomb
C. Ransomware
D. RAT
E. Crypto-malware
F. No malware is indicated
Check out the answer and full explanation here.
Monday, May 14, 2018
Understanding Network Separation
Are yo planning to take the Security+ SY0-401 or SY0-501 exam?
If so, see if you can answer this sample question.
Q. You are tasked with configuring a switch so that it separates VoIP and data traffic. Which of the following provides the BEST solution?
Check out the answer and full explanation here.
If so, see if you can answer this sample question.
Q. You are tasked with configuring a switch so that it separates VoIP and data traffic. Which of the following provides the BEST solution?
A. NAC
B. DMZ
C. SRTP
D. VLAN
Check out the answer and full explanation here.
Monday, May 7, 2018
Vulnerability Assessment Tools
Are you planning to take the SY0-401 or SY0-501 Security+ exam?
If so, see if you can answer this practice test question.
Q. You suspect that a user is running an unauthorized AP within the organization’s building. Which of the following tools is the BEST choice to see if an unauthorized AP is operating on the network?
If so, see if you can answer this practice test question.
Q. You suspect that a user is running an unauthorized AP within the organization’s building. Which of the following tools is the BEST choice to see if an unauthorized AP is operating on the network?
A. Rogue system
B. Wireless scanner
C. Password cracker
D. Penetration test
Monday, April 30, 2018
Security+ and Physical Security Controls
Are you planning to take the SY0-501 or SY0-401 Security+ exam? If so, make sure you have a basic understanding of security controls including physical security controls.
See if can answer this sample Security+ question
Q. Management within your organization wants to create a small network used by executives only. They want to ensure that this network is completely isolated from the main network. Which of the following choices BEST meets this need?
A. Airgap
B. Mantrap
C. Control diversity
D. Infrared motion detectors
Check out the answer and full explanation here.
See if can answer this sample Security+ question
Q. Management within your organization wants to create a small network used by executives only. They want to ensure that this network is completely isolated from the main network. Which of the following choices BEST meets this need?
A. Airgap
B. Mantrap
C. Control diversity
D. Infrared motion detectors
Check out the answer and full explanation here.
Monday, April 23, 2018
Security+ and Log Entries
Are you preparing for the SY0-401 and SY0-501 Security+ exam? If so, you might like to review some information on log entries.
As an example, consider the following Security+ practice test question that I recently added to the test banks on the gcgapremium.com site.
Q. Your IPS recently raised an alert from the following log entry on of your organization’s web servers:
Can you answer it? Check out the answer and full explanation here.
As an example, consider the following Security+ practice test question that I recently added to the test banks on the gcgapremium.com site.
Q. Your IPS recently raised an alert from the following log entry on of your organization’s web servers:
04/23/18 23:13:50 httpd: GET /wp/forms/process.php?input=cd%20../../../etc;cat%20shadowBased on this log entry, which of the following is MOST likely occurring
A. False negative
B. XSS attack
C. Command injection attack
D. Password attack
E. Buffer overflow attack
Can you answer it? Check out the answer and full explanation here.
Monday, April 16, 2018
NAC Systems and Security+
Are you preparing for the SY0-501 or SY0-401 Security+ exam? If so, you should have a basic understanding of network components that support organizational security. This includes using NAC systems to verify computers meet preset security conditions.
See if you can answer this sample Security+ question.
Q. Your organization recently implemented a BYOD policy. However, management wants to ensure that mobile devices meet minimum standards for security before they can access any network resources. Which of the following agents would the NAC MOST likely have?
A. Permanent
B. Health
C. RADIUS
D. Dissolvable
Check out the answer and full explanation here.
See if you can answer this sample Security+ question.
Q. Your organization recently implemented a BYOD policy. However, management wants to ensure that mobile devices meet minimum standards for security before they can access any network resources. Which of the following agents would the NAC MOST likely have?
A. Permanent
B. Health
C. RADIUS
D. Dissolvable
Check out the answer and full explanation here.
Monday, March 26, 2018
Security+ and Proxy Servers
Are you planning to take the SY0-401 Security+ or SY0-501 Security+ exam? If so, make sure you understand basic network components.
As an example, see if you can answer this sample Security+ question.
Q. Management at your organization wants to prevent employees from accessing social media sites using company-owned computers. Which of the following devices would you implement?
A. Transparent proxy
B. Reverse proxy
C. Nontransparent proxy
D. Caching proxy
Check out the answer and explanation here.
As an example, see if you can answer this sample Security+ question.
Q. Management at your organization wants to prevent employees from accessing social media sites using company-owned computers. Which of the following devices would you implement?
A. Transparent proxy
B. Reverse proxy
C. Nontransparent proxy
D. Caching proxy
Check out the answer and explanation here.
Monday, March 19, 2018
Security+ and Penetration Testing
Are you planning to take the SY0-501 or SY0-401 Security+ exam. If so, make sure you understand some basic penetration testing concepts.
As an example, see if you can answer this sample question?
Q. A penetration tester has successfully attacked a single computer within the network. The tester is now attempting to access other systems within the network via this computer. Which of the following BEST describes the tester’s current actions?
A. Performing reconnaissance
B. Performing the initial exploitation
C. Pivoting
D. Escalating privileges
Check out the answer (and full explanation) here.
Friday, March 2, 2018
Security+ and Secure Coding
The CompTIA Security+ exam includes many concepts related to secure coding techniques. If you're planning to take the SY0-401 or the SY0-501 Security+ exam, you should have a basic understanding of techniques such as proper error handling, input validation, and more.
As an example, can you answer this sample SY0-501 practice question?
Q. You are reviewing some Java code for an application and come across the following snippet:
You suspect that this will cause a problem. Which of the following BEST describes the problem?
A. NullPointerException
B. Invalid null assignment
C. Pointer dereference
D. Buffer overflow
Check out this page to see if you're correct (and see the full explanation).
As an example, can you answer this sample SY0-501 practice question?
Q. You are reviewing some Java code for an application and come across the following snippet:
You suspect that this will cause a problem. Which of the following BEST describes the problem?
A. NullPointerException
B. Invalid null assignment
C. Pointer dereference
D. Buffer overflow
Check out this page to see if you're correct (and see the full explanation).
Monday, February 26, 2018
Security+ and High Availability
For example, can you answer this question?
Q. Your organization is planning to deploy a new e-commerce web site. Management anticipates heavy processing requirements for a back-end application. The current design will use one web server and multiple application servers. Which of the following BEST describes the application servers?
A. Load balancing
B. Clustering
C. RAID
D. Affinity scheduling
Q. Your organization is planning to deploy a new e-commerce web site. Management anticipates heavy processing requirements for a back-end application. The current design will use one web server and multiple application servers. Which of the following BEST describes the application servers?
A. Load balancing
B. Clustering
C. RAID
D. Affinity scheduling
Tuesday, February 20, 2018
Watch Out For This IRS Tax Scam
The IRS is warning people about another IRS tax scam. It's already hit several thousand people and based on its success so far, it will probably continue.
- Criminals use stolen client data from tax professionals and use them to file fraudulent tax returns.
- In the tax return, they ask the IRS to deposit the money into the taxpayer's bank account (or sometimes send a check).
- Criminals then demand that the money be returned.
Monday, February 12, 2018
Security+ and PKIs
Are you planning to take the SY0-401 or SY0-501 exam? If so, make sure you understand some basic PKI concepts. As an example, can you answer this sample Security+ practice test question?
Q. An organization hosts several web servers in a web farm used for e-commerce. Due to recent attacks, management is concerned that attackers might try to redirect web site traffic, allowing the attackers to impersonate their e-commerce site. Which of the following methods will address this issue?
A. Stapling
B. Perfect forward secrecy
C. Pinning
D. Key stretching
Check out the answer and full explanation here.
Q. An organization hosts several web servers in a web farm used for e-commerce. Due to recent attacks, management is concerned that attackers might try to redirect web site traffic, allowing the attackers to impersonate their e-commerce site. Which of the following methods will address this issue?
A. Stapling
B. Perfect forward secrecy
C. Pinning
D. Key stretching
Check out the answer and full explanation here.
Monday, February 5, 2018
Cloud Computing
Are you planning to take the SY0-401 or SY0-501 Security+ exam?
Can you answer this sample Security+ practice test question?
Q. The Shelbyville Nuclear Power Plant stores some data in the cloud using its own resources. The Springfield school system also has a cloud using its own resources. Later, the two organizations decide to share some of the educational data in both clouds. Which of the following BEST describes the cloud created by these two organizations?
A. Community
B. Private
C. Public
D. PaaS
See if you're correct, and read the full explanation here.
Check out the answer (and the full explanation) here.
Can you answer this sample Security+ practice test question?
Q. The Shelbyville Nuclear Power Plant stores some data in the cloud using its own resources. The Springfield school system also has a cloud using its own resources. Later, the two organizations decide to share some of the educational data in both clouds. Which of the following BEST describes the cloud created by these two organizations?
A. Community
B. Private
C. Public
D. PaaS
See if you're correct, and read the full explanation here.
Check out the answer (and the full explanation) here.
Monday, January 29, 2018
Protecting PII
Are you planning to take the SY0-401 or the SY0-501 Security+ exam? If so, make sure you have a basic understanding of privacy concepts.
As an example, see if you can answer this sample practice test question:
Q. Your organization has decided to increase the amount of customer data it maintains and use it for targeted sales. However, management is concerned that they will need to comply with existing laws related to PII. Which of the following should be completed to determine if the customer data is PII?
More, do you know why the correct answer is correct and the incorrect answers are incorrect?
Check out the answer here.
As an example, see if you can answer this sample practice test question:
Q. Your organization has decided to increase the amount of customer data it maintains and use it for targeted sales. However, management is concerned that they will need to comply with existing laws related to PII. Which of the following should be completed to determine if the customer data is PII?
A. Privacy threshold assessment
B. Privacy impact assessment
C. Tabletop exercise
D. Affinity scheduling
More, do you know why the correct answer is correct and the incorrect answers are incorrect?
Check out the answer here.
Monday, January 22, 2018
Biggest Cybersecurity Threat
Do you know what many experts are referring to as the biggest cybersecurity threat?
You may be surprised.
Check out this sample Security+ practice test question to see if you can answer it. It also gives a hint of what may be the biggest security threat for any organization.
Q. The CEO of a company recently received an email. The email indicates that her company is being sued and names her specifically as a defendant in the lawsuit. It includes an attachment and the email describes the attachment as a subpoena. Which of the following BEST describes the social engineering principle used by the sender in this scenario?
A. Whaling
B. Phishing
C. Consensus
D. Authority
The answer and explanation is here, along with a short discussion of what many organizations consider the biggest security threat.
You may be surprised.
Check out this sample Security+ practice test question to see if you can answer it. It also gives a hint of what may be the biggest security threat for any organization.
Q. The CEO of a company recently received an email. The email indicates that her company is being sued and names her specifically as a defendant in the lawsuit. It includes an attachment and the email describes the attachment as a subpoena. Which of the following BEST describes the social engineering principle used by the sender in this scenario?
A. Whaling
B. Phishing
C. Consensus
D. Authority
The answer and explanation is here, along with a short discussion of what many organizations consider the biggest security threat.
Monday, January 8, 2018
Security+ and Database Concepts
Are you planning to take the SY0-501 Security+ exam? If so, you should understand some database concepts that weren't tested in the SY0-401 exam.
See if you can you answer this question?
Q. Database administrators have created a database used by a web application. However, testing shows that the application is taking a significant amount of time accessing data within the database. Which of the following actions is MOST likely to improve the overall performance of a database?
A. Normalization
B. Client-side input validation
C. Server-side input validation
D. Obfuscation
Check out the answer and full explanation here.
See if you can you answer this question?
Q. Database administrators have created a database used by a web application. However, testing shows that the application is taking a significant amount of time accessing data within the database. Which of the following actions is MOST likely to improve the overall performance of a database?
A. Normalization
B. Client-side input validation
C. Server-side input validation
D. Obfuscation
Check out the answer and full explanation here.
Tuesday, January 2, 2018
IDSs and IPSs on the Security+ Exam
Are you planning to take the Security+ exam? If so, make sure you know about IDSs and IPSs.
For example, can you answer this question?
Q. A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?
A. Network-based
B. Signature-based
C. Heuristic-based
D. Anomaly-based
Check out the answer and explanation here.
For example, can you answer this question?
Q. A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?
A. Network-based
B. Signature-based
C. Heuristic-based
D. Anomaly-based
Check out the answer and explanation here.
Subscribe to:
Posts (Atom)