Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

SBOLC Security Plus Study Guide with Complete Solutions, Exams of Advanced Education

The sbolc security plus study guide with complete solutions is a comprehensive resource for individuals preparing for the security+ certification exam. A wide range of security-related topics, including cryptography, authentication, access control, network security, and incident response. It provides detailed explanations of various security concepts, protocols, and technologies, as well as practical solutions and examples. The guide is designed to help readers understand the fundamental principles of information security and develop the skills necessary to implement effective security measures in a professional setting. Whether you are a student, it professional, or security enthusiast, this study guide can be a valuable tool in your journey towards mastering the security+ certification.

Typology: Exams

2023/2024

Available from 08/24/2024

Examproff
Examproff 🇺🇸

1

(1)

6K documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
SBOLC Security Plus Study Guide with
Complete Solutions
2Fish - ANSWER-similar to AES
3DES - ANSWER-(old and slow x 3)
Acceptance - ANSWER-Cost of a countermeasure outweighs the loss due to a risk
AES - ANSWER-De facto standard
Asymmetric - ANSWER-DEER, has 2 keys
Authentication is the most critical step in the identification process. It is proving of a
subjects claim to identification. - ANSWER-
Authentication types - ANSWER-Something you know (password or PIN), Something
you have (smart card, token, or device), Something you are (fingerprints or retinal
pattern), Something you do (keystroke authentication), Somewhere you are (location)
Availability goal - ANSWER-continuous operation, available for use
Avoidance - ANSWER-Not performing an activity that could carry risk
Backdoor - ANSWER-Allows access to a system without having to authenticate
Block Cipher - ANSWER-found in software. Applied to block data (64 contiguous bits) at
once as a group. Very slow but more secure than Stream
Blowfish - ANSWER-(fastest, 64bit)
Bot - ANSWER-programs that run on automated tasks. Obeys a master or author of the
code
Botnet - ANSWER-collection of zombies- a network of compromised systems containing
malware which acts as a robot. Controlled by a master
Botnet attack - ANSWER-large number of computers under the control of a single evil
guy, who uses the botnets to ALL conduct a DoS attack at the same time. significant
effect on the target. Distributed DOS.
Captive Portal - ANSWER-Captures or redirects the users initial traffic because
something more is needed from the user, such as a credit card, or user name and
password.
pf3
pf4
pf5

Partial preview of the text

Download SBOLC Security Plus Study Guide with Complete Solutions and more Exams Advanced Education in PDF only on Docsity!

SBOLC Security Plus Study Guide with

Complete Solutions

2Fish - ANSWER-similar to AES 3DES - ANSWER-(old and slow x 3) Acceptance - ANSWER-Cost of a countermeasure outweighs the loss due to a risk AES - ANSWER-De facto standard Asymmetric - ANSWER-DEER, has 2 keys Authentication is the most critical step in the identification process. It is proving of a subjects claim to identification. - ANSWER- Authentication types - ANSWER-Something you know (password or PIN), Something you have (smart card, token, or device), Something you are (fingerprints or retinal pattern), Something you do (keystroke authentication), Somewhere you are (location) Availability goal - ANSWER-continuous operation, available for use Avoidance - ANSWER-Not performing an activity that could carry risk Backdoor - ANSWER-Allows access to a system without having to authenticate Block Cipher - ANSWER-found in software. Applied to block data (64 contiguous bits) at once as a group. Very slow but more secure than Stream Blowfish - ANSWER-(fastest, 64bit) Bot - ANSWER-programs that run on automated tasks. Obeys a master or author of the code Botnet - ANSWER-collection of zombies- a network of compromised systems containing malware which acts as a robot. Controlled by a master Botnet attack - ANSWER-large number of computers under the control of a single evil guy, who uses the botnets to ALL conduct a DoS attack at the same time. significant effect on the target. Distributed DOS. Captive Portal - ANSWER-Captures or redirects the users initial traffic because something more is needed from the user, such as a credit card, or user name and password.

Cast - ANSWER-128/ Centralized - ANSWER-PKI. Using centralized server, process can be managed with a large single system.. large scale system is more vulnerable to attack Cold Site - - ANSWER-dedicated space, but there is no actual infrastructure inside. This could be something like an empty warehouse floor. Cold site, warm site, hot site - ANSWER-used for when a primary site might go down due to weather, emergencies, explosions, or whatever Confidentiality goal - ANSWER-random ppl cant see your messages, only the intended receiver Configuration baselines - ANSWER-establishes mandatory settings that systems must have in place to be accepted for use in the network. Decentralized - ANSWER-WEB PGP/GPG. Allows process to be pushed out into organization or environment. Denial of Service (DOS) attack - ANSWER-system/service is unavailable for use DES - ANSWER-(old and slow, 64 bit-56 effective) Deterrence - ANSWER-Put something in place that will make it so the attacker will not want to perform the malicious act because of the consequences. Diffie Hellman - ANSWER-(only for key exchange) Directory Services - ANSWER-naming system that stores , organizes, and provides access to information in a directory Distributed Denial of Service (DDoS) - multiple attackers prevents access to resources for authorized users - ANSWER- DNS attacks - ANSWER-Domain Name Service translates IP addresses and domain names (such as Google.com). If you try to go to Google.com and someone has attacked your DNS resolution, he could send you to his malicious site that looks exactly like Google and steal your information that you put into the site DOS - ANSWER-floods a server with requests of some type (could be pings, SYNs, etc) which makes the server unavailable for its normal duties Dynamic - ANSWER-pool of public IP addresses is shared by an entire private IP subnet

IPv4 - ANSWER-most common. 32 bit IPv6 - ANSWER-128 bits Uses hexadecimal more IP space and more built in security Key archives - ANSWER-keys currently and actively being used Key escrow - ANSWER-storage of info with a third party Key Management - ANSWER-process of working with keys Key recovery - ANSWER-info stored using older keys is inaccessible using a newer key Key storage - ANSWER-where you keep them LDAP - ANSWER-follows X.500 standard. active directory communicates in this language. vulnerabilities- man in the middle, evil twin, improper directory settings Least privilege - ANSWER-gives users only the permissions they need to do their work and no more Logic bombs - ANSWER-(spyware) Inserted into a system which sets off an action when specific conditions are met Man in middle - ANSWER-(redirection attacks) Managerial - ANSWER-policies and procedures put into place to define and guide employees actions in dealing with sensitive info. Mandatory vacations - ANSWER-require employee to take vaca to uncover possible fraud activity Microsoft active directory - ANSWER-uses Kurburos for authentication Mitigation - ANSWER-Reducing either the probability or consequences of a threat. Anywhere from physical (man traps) to financial measures (insurance, cash stockpiling) Mutual authentication - ANSWER-two or more parties authenticate to each other NAT - ANSWER-effectively hides your network from the world Need to know - ANSWER-describes the restriction of data that is considered sensitive. Network access control (NAC) - ANSWER-goal is to prevent computers with suboptimal security from potentially infecting other systems in the network. Enforces policy.

Operational define how people in the organization should handle data, software and hardware. should include environmental and physical security. - ANSWER- OS hardening techniques - ANSWER-process of securely configuring the system against security vulnerabilities Passwords - ANSWER-use uppercase and lowercase special characters and numbers are stronger. min length should be 8 characters. PAT - ANSWER-allows many private hosts to share a single IP address by multiplexing the communication streams and differentiated by TCP/UDP port numbers Patch management - ANSWER-keep your OS and programs patched to close vulnerabilities Phishing - ANSWER-Tricking people into divulging PII and/or financial information. Del via email Physical Security - ANSWER-shields the organization from attackers attempting to gain access to the premises Ping of Death - ANSWER-massive ping packet to crash server Point to Point - no encryption - ANSWER- Point to Point over Ethernet (PPPoE) - Provides authentication, encryption, compression - ANSWER- Point to Point Tunneling Protocol (PPTP) - turns PPP frame into IP packets - ANSWER- Post office protocol V3 (POP3) - ANSWER-downloads email from an inbox on an email server to an email client. Uses TCP port 10. POP3S uses TCP port 993 Qualitative - ANSWER-researching the likelihood and impact of a risk. (risk= likelihood of occurrence x impact on organization Quantitative - ANSWER-assigns "real" numbers to the cost of damages and countermeasures Quarantine portal - ANSWER-redirects user to a quarantine area where fixes can be accessed. Usually a web page with hyperlinks to the fixes. Once necessary software is installed the system is then in compliance. RC - ANSWER-4,5,6 (RC4=stream, used in WEB &WPA) Remote desktop protocol - ANSWER-Allows user to control a networked computer

TCP vs UDP - ANSWER-UDP is "best effort" delivery with to nodes on a network. Little overhead and is often used for streaming audio or video traffic. TCP is reliable one-to- one connection between two hosts. Uses 3-way handshake (SYN-SYN ACK- ACK) Teardrop - ANSWER-fragment the packets Technical - ANSWER-devices, processes, protocols, and other measures use to protect the CIA of sensitive info. (technical measures) Transference - ANSWER-Shifting the burden of loss to another party through legislation, contract, insurance or other means Transport - ANSWER-used for end to end encryption of data. Packet is protected but the header is left in tact Trojan Horse - ANSWER-(ransomware) Social engineering. Included as an attachment or as part of an installation program Tunnel - ANSWER-uses encapsulation for the header info and is used in link-to-link network communications. Both the packet content and header are protected Tunneling methods - ANSWER-virtual dedicated connection between two systems or networks. Sends private data across a public network by encapsulating data into other packs. Type I - ANSWER-False Reject rate (FRR) Type II - ANSWER-False Accept rate (FAR) Virus (spam) - ANSWER-replicates itself on a system. Requires a host to move from system to system VPN Tunneling - ANSWER- Warm site - - ANSWER-Cold site but you have the servers or whatever actually already set up. They are just not turned on. It's more expensive to maintain than a cold site, but can also get your business up and running more quickly. Whaling - ANSWER-Targets upper management Worms - ANSWER-(adware) self-contained Zombie - ANSWER-compromised system