News:

SMF - Just Installed!

CompTIA Security+

Started by Richard, Nov 13, 2023, 10:40 AM

Previous topic - Next topic

Richard

Nov 13, 2023, 10:40 AM Last Edit: Nov 13, 2023, 01:09 PM by Richard
CompTIA Security+ Continuing Education (CE) *ABOUT*

1] Read/Sign Code of Ethics Policy (check both boxes at bottom)
@https://www.certmetrics.com/comptia/candidate/ce_sign_agreement.aspx

2] Pay CE Maintenance Fees (using PayPal)
@https://www.certmetrics.com/comptia/candidate/ecom_creq_ce_list.aspx
> Select CE Intent Level [CE CompTIA Security+] > Submit

3] Add CEUs (50 for Security+) from FedVTE (11APR2023 Catalog)

> Select CE Intent Level [CE CompTIA Security+] > Submit

3A] Printer > Select Activity > Training and Higher Education >

3B] *Optional* Work Experience for 3 years (9 CEUs)
- Supervisor-signed letter for 1 year work period



Add Continuing Education (CE) Credits: https://www.certmetrics.com/comptia/candidate/ce_summary.aspx
> Add CEUs > Submit(S+) > Training and Higher Education > Completed a Training Course (1 unit per hour) for Security+ CEUs > Accept Activity > Training Provider / Certification Vendor: U.S. Department of Homeland Security / FedVTE








>> Network-Specific Courses [HRS]
[13] Cisco CCENT Self-Study Prep
[15] Cisco CCNA Security Self-Study Prep*
> 12/19/22, 12/28/21
[09] Demilitarized Zone (DMZ) with IDS/IPS
[05] IPv6 Security Essentials Course*
> 12/8/22, 12/28/21
[03] Network Layer 1 & 2 Troubleshooting
[18] Network Security
[13] (x) Offensive and Defensive Network Operations (2015 NO LONGER VALID)
[09] Wireless Network Security (WNS)*
> NO LONGER VALID AS OF 2013

Richard

Nov 13, 2023, 11:29 AM #2 Last Edit: Nov 13, 2023, 11:33 AM by Richard
>> Cyber Risk Management for Technicians <<

Which NIST special publication is a guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach?
A NIST SP 800 39
B NIST SP 800 53A
C NIST SP 800 53
D. NIST SP 800 37

Which of the following is a part of the Examine Method?
A List processes that should be running
B Making the information available to all information system users
C. Inspecting the physical security measures
D Testing access control

If the cost of controls exceeds the benefit the organization may choose to accept the risk instead.
A. True
B False

Which OCTAVE process involves collecting information about important assets and security requirements and threats and current organizational strengths and vulnerabilities from managers of selected operational areas?
A. Identify Operational Area Knowledge
B Create Threat Profiles
C Identify Senior Management Knowledge
D Identify Staff Knowledge

Open Source Security (OSSEC) is what?
A. A host based security system that monitors for changes
B A network based security system that sends alert messages
C An email based security system that scans emails for vulnerabilities.
D None of the above

Which of the following describes NetScan Tools Pro?
A A network debugging and exploration tool
B A powerful command line packet analyzer
C A tool that provides advanced network trace routing
D. A collection of Internet information gathering and network troubleshooting utilities

In NIST SP 800 53 the security control structure consists of all the following components except for:
A Priority and baseline allocation
B Supplemental guidance
C Control enhancements
D. All of these are in the security control structure

In order to automate host characteristic monitoring you can compare baselines and snapshots with syslog.
A True
B. False

Which of the following is a step in detecting and analysing host changes?
A Create a current snapshot of your host
B Create a baseline of your host
C Compare your snapshot to your baseline
D. All of the above

Which tier of Risk Management is associated with Enterprise Architecture?
A Tier 1 Organization (Governance)
B. Tier 2 Mission (Business Process)
C Tier 3 Information System (Environment of Operations)
D. None of the above

Kismet is different from a normal network sniffer such as Wireshark or tcpdump because it separates and identifies different wireless networks in the area.
A. True
B False

What type of analysis involves using scales to suit circumstances and allows for quick identification of potential risks as well as vulnerable assets and resources?
A Quantitative Analysis
B Audit Analysis
C. Qualitative Analysis
D Cost/benefit analysis

NIST SP 800 30 defines risk as a function of the likelihood of a given threat source exercising a particular potential vulnerability and the resulting impact of that adverse event on the organization.
A. True
B False

Which step of a risk assessment uses the history of system attacks?
A. Step 2: Threat Identification
B Step 3: Vulnerability Identification
C Step 4: Control Analysis
D Step 5: Likelihood Determination

One strategy for determining the proper level of acceptable risk is to:
A Eliminate the asset exposure to risk or eliminate the asset altogether
B There is no level of acceptable risk
C. Determine a point where cost of mitigation is less than cost of loss
D Shift responsibility for the risk to a third party (ISP MSSP Insurance etc.)

The threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe?
A. High
B Medium
C Low
D None of the above

Which of the following is not part of the process for assessing security controls according to NIST SP 800 53A 1?
A. Study
B. Develop
C Conduct
D Analyze

What tool would be best to automatically detect your network and construct a complete and easy to view network map?
A Firewalk
B Path Analyser Pro
C. LANsurveyor
D SNMP

What is the high water mark for an information system?
A Highest Potential Threat value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
B. Highest Potential Impact value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
C Lowest Potential Vulnerability value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system.
D Marks on the server room wall to evaluate level of water during a flood.

Which of the following families of controls belongs to the technical class of controls?
A. Physical and Environmental Protection
B System and Information Integrity
C System and Services Acquisition
D. Identification and Authentication

FIPS 200 is:
A A threat assessment program
B A document that lays out the incident response life cycle
C A short document describing categorization of information and information systems
D. A short document that describes the minimum security requirements for information and information systems

In risk management people and information and technology are examples of?
A. Assets
B Processes
C Services
D None of the above

What is the order of the Change Control Process?
A Request : Approval : Build : Impact Assessment : If successful Implement
B. Request : Impact Assessment : Approval : Build and or Test : Implement
C. Request : Impact Assessment : Build and or Test : Implement
D Request : Impact Assessment : Build and or Test : Approval : Implement

Which risk comes from a failure of the controls to properly mitigate risk?
A Inherent risk
B Residual Risk
C. Control Risk
D All of the above

The following should be taken into account when accepting the residual risk inherent in the project.
A The sensitivity or the criticality of the assets involved
B Uncertainty incorporated in the risk assessment approach itself
C The ability to shift responsibility for the risk to a third party
D. All of the above

Richard

>> IPv6 Security Essentials <<

IPv6 introduces the concept of extension headers. What IPv6 header field facilitates the use of multiple extension headers within a single packet?
-TTL
-ToS
-Flow Label
+Next Header

What DNS record is used to identify an IPv6 host?
+AAAA
-PTR
-A
-CNAME

What protocol replaces ARP for IP-to-MAC resolution in IPv6?
-ARPv6
-RARP
+Neighbor Discovery Protocol (NDP)
-IPv6 still uses ARP

IPv6 is more secure than IPv4 because packets are automatically encrypted with IPSec.
-True
+False

IPv4 addresses are written in dotted-decimal. How are IPv6 addresses written?
-Dotted Decimal
-Binary
+Colon Hexadecimal
-Colon Decimal

What is the primary driver for IPv6 implementation?
-Creating a faster Internet
+IPv4 Address exhaustion
-Better end-to-end communications
-Support the Internet of Things (IoT)

What is Teredo?
-Potential IPv6 attack vector
-Automatic tunneling protocol
-IPv6 transition mechanism
+All of the above

MAC and IP address spoofing is no longer possible in IPv6.
-True
+False

How many bits are IPv6 addresses?
+128-bits
-128-bytes
-40-bits
-32-bits

Intermediate routers automatically fragment IPv6 packets when the packet size exceeds the MTU for the destination link.
-True
-False