Which of the following security controls would be most effective in preventing unauthorized access to a system by an attacker with physical access to a device?
Biometric authentication, such as fingerprint or facial recognition, is effective in preventing unauthorized access when an attacker has physical access to the device.
Which of the following methods to secure data provides the best protection for data at rest?
Encryption provides the best protection for data at rest by making it unreadable without the decryption key.
Which of the following is the best security reason for closing service ports that are not needed?
Closing unnecessary service ports helps reduce the attack surface of a system, minimizing opportunities for exploitation.
Which of the following security concepts is associated with the implementation of a RADIUS server?
RADIUS servers are used for authentication, authorization, and accounting (AAA) to manage network access.
A security analyst is working with the IT group to define appropriate procedures for the destruction of media and assets in the enterprise environment. Which of the following methods provides the strongest level of assurance that the data has been disposed of properly?
Physical shredding of storage media destroys the platters or chips, ensuring data cannot be reconstructed. It provides the highest level of assurance compared to software-based methods.
Which security concept is accomplished when granting access after a user has logged into a network?
Authorization is the process of granting rights and permissions to authenticated users.
Which of the following is the best security reason for closing service ports that are not needed?
Closing unused service ports reduces the number of entry points that attackers can exploit. This practice minimizes the system's attack surface and strengthens overall security.
The local administrator account for a company's VPN appliance was used to log in to the remote management interface. Which of the following would have most likely prevented this from happening?
Assigning individual user IDs ensures that each user has a unique account, which reduces the risk of shared credentials and allows better tracking and access control.
An organization designs an inbound firewall with a fail-open configuration while implementing a website. Which of the following does the organization consider to be the highest priority?
A fail-open firewall prioritizes availability by allowing traffic to pass if the device fails. This ensures continuous access to services even during a hardware or software outage. The trade-off is reduced security during failure, but availability remains the top concern.
An administrator is creating domain profiles for employees and wants to assign permissions based on user roles and departments. Which of the following would fulfill this requirement?
Security groups allow administrators to assign permissions to groups of users based on their roles or departments instead of managing each user individually. This simplifies administration and ensures consistent access control across the organization.
Which MFA method is most seamless, integrates easily with user workflow, and can leverage employee-owned devices?
Push notifications on smartphones provide a seamless MFA method requiring minimal user effort.
A security analyst needs to improve the company’s authentication policy following a password audit. Which of the following should be included in the policy? (Select 2 Answers)
Requiring both adequate length and complexity makes passwords significantly harder to crack, increasing resistance to brute-force and guessing attacks.
Which of the following security controls would best guard a payroll system against insider manipulation threats?
Detective controls, such as audit logs and monitoring, help identify and alert on suspicious activity within systems like payroll. This makes them effective for catching insider threats after they occur or while in progress.
A security administrator is implementing encryption on all hard drives in an organization. Which of the following security concepts is the administrator applying?
Encryption is a technique used to ensure the confidentiality of data by making it unreadable to unauthorized users.
An alert references attacks associated with a zero-day exploit. An analyst places a bastion host in the network to reduce the risk of the exploit. Which of the following types of controls is the analyst implementing?
A bastion host serves as a compensating control, offering a hardened gateway when the primary defense—patching against the zero-day—is not yet available. It mitigates risk by restricting access paths.
Quiz Complete!
Domain 1: General Security Concepts