Chapter 1
What is the purpose of network reconnaissance in the context of network security?
What is the purpose of the pipe operator (|) in the command ’sudo cat /var/log/auth.log | more’?
What principle ensures that systems are available when needed and often addresses single points of failure in network systems?
What is used to query the Linux system logging utility (journald) and why?
What is the purpose of redundancy in networking?
What information does the auth.log contain in a Linux system?
What is a major function of a ’Log collector’ as it pertains to a Security Information and Event Management (SIEM)?
What is risk in the context of IT security?
What type of information does the ’date’ field record in the Common Log format standardized by the World Wide Web Consortium (W3C)?
What does the ’Alternate flow’ element in a use case describe?
What does the command ’sudo cat /var/log/auth.log’ do in Linux?
What is one of the methods utilized by organizations to keep their systems available?
How can a systems administrator use the ’ping’ command to assess organizational security?
In the context of security controls, what purpose does change management serve?
Why might organizations choose not to encrypt all of their data despite the increase in security?
What is the content of the NIST SP 800-53 Revision 5?
What is the role of ’Data Inputs’ in a Security Information and Event Management (SIEM) system?
Which of the following statements is true about the sensitivity levels in a SIEM system?
Which of the following best describes what Corrective controls do according to the CompTIA?
What is included in ’Physical and environmental protection’ as an operational control?
What does log aggregation in a Security Information and Event Management (SIEM) system refer to?
What type of control can a lock be classified as, in addition to being a physical control?
What does the command sudo ifconfig eth0 do on Linux systems?
What does the ’arp -a’ command do in the context of a Windows operating system?
What are the key elements of access controls that help ensure the confidentiality of data?
Which of the following is a function that firewalls perform as a technical control?
What does sentiment analysis refer to within a SIEM system?
What is the ’host’ in the context of Network logs and Common Log Format?
Most SIEM systems include multiple built-in reports. What do these reports typically cover?
What is the primary difference between scalability and elasticity in terms of system availability?
What is the primary purpose of using physical locks as a part of security controls?
What type of information does the /var/log/auth.log file contain on a Linux system?
What does the ’ping 192.168.1.1’ command do?
Which log file in a Linux system contains entries generated during system boot-up?
Which is NOT a correct definition of a particular control type according to CompTIA?
What is the primary purpose of a cable lock as a deterrent control?
What is the CIA security triad in the context of organizational security principles?
What is stored in the var/log/messages file?
In the context of network logs, what does the ’status’ refer to?
What is a key benefit of using a centralized security information and event management (SIEM) system in a large organization?
Which of the following is NOT an example of a detective control?
What is a discriminating feature about the NXLog Community Edition compared to other log management tools?
What does the authuser field in a web server log typically record?
Which of the following best describes Detective controls, in terms of security controls?
What are the key elements of access controls?
Which of the following accurately describes a common capability of a SIEM system?
Which of the following is NOT a control type listed by CompTIA in the Security+ objectives?
Which of the following best describes the purpose of preventative controls in IT security?
Which command provides a comprehensive listing of TCP/IP configuration for each NIC, including MAC address, address of assigned DNS servers and address of a DHCP server?
What is the role of antivirus software as a technical control?
What does the /var/log/messages log contain in a Linux environment?
Which of the following options accurately describes technical controls, as per the CompTIA Security+ objectives?
What is the purpose of the ’journalctl –list-boots’ command in Linux system?
Which command is used to search for a specific text in a file?
What does the ’ifconfig eth0’ command in a Linux-based system do?
Why is time synchronization important in a SIEM system?
A network log entry in the Common Log format standardized by the W3C typically contains which of the following details?
What does the ’ip -s link’ command do on Linux systems?
What is the role of ’Deterrent controls’ in Organization’s security policy?
What is the function of a correlation engine in a SIEM system?
What is the function of the ’logger’ command in the CompTIA Security+ context?
What does the TIME_WAIT state indicate in the netstat command?
What information does the ’Netstat -a’ command display on a system?
What does the ’ifconfig eth0 promisc’ command do on a Linux system?
What is the function of video surveillance as a detective control in a security setting?
Which Windows log type records auditable events, such as a user’s success or failure in performing actions like logging on or deleting a file, by default?
What does ’WORM’ refer to in the context of a security information and event management (SIEM) system?
What does the command ’sudo head /var/log/syslog’ do?
What is the purpose of compensating controls in a security framework?
What does the ’more’ command do when used in conjunction with the ’cat’ command in a Linux environment?
What is the primary function of managerial controls in a security structure?
What role do security guards play as a type of preventative control?
What does the term ’least privilege’ in the context of technical controls refer to?
What does the ’bytes’ denote in the Common Log format standardized by the World Wide Web Consortium (W3C)?
What does the pathping -n command do in network administration?
What does the command ’chmod 760 filename’ represent in Linux?
What is the purpose of using the command ’sudo grep “authentication failure”/var/log/auth.log’?
What is the result of running the command ’sudo cat /var/log/auth.log’ in a Linux system?
What is the purpose of using the ping command to check name resolution based on the provided passage?
What is the primary function of the ’head’ command in the context of log files?
What is the definition of risk in the context of IT security?
What is the primary function of the ’ipconfig’ command on a Windows system?
What does the ’netstat -p tcp’ command do?
What does the ’Netstat -e’ command do?
What does the pathping command do?
What are the two types of common managerial controls in an organization’s written security policy, according to the given text?
What is event deduplication in the context of a Security Information and Event Management (SIEM) system?
Which of the following is NOT an example of a corrective or recovery control?
What does the /var/log/faillog Linux log file contain information about?
What is the primary function of the ’ping -t 192.168.1.1’ command on a Windows system?
What is a key function of Security information and event management (SIEM) systems as a detective control?
What does the ’Netstat -n’ command do?
What is the function of the ’ipconfig /flushdns’ command?
Which tool helps in detecting malicious traffic after it enters a network in the context of detective controls?
What type of events does the Application log record in a Windows operating system?
What is a common goal of fault tolerance and redundancy techniques in an information system?
Which of the following best describes the function of disk redundancies in the context of availability and fault tolerance?
What does the ’user-identifier’ field in the Common Log Format represent?
What does the acronym LAMP stand for in the context of web hosting?
Which of the following best describes the combination of control categories and types based on the provided excerpt?
What is the role of ’request’ in the data logged by a web server?
What are the three types of permissions that can be modified with the chmod command on Linux system files and folders?
What is the unique functionality that Rsyslog provides as an improvement over Syslog-ng?
What does the ’SYN_RECEIVED’ state in Netstat mean?
What does the ESTABLISHED state in the netstat command output indicate?
What is a major feature of the Rsyslog software utility that differentiates it from Syslog-ng as mentioned in the provided text?
What is the definition of risk in IT security context?
What does the ’tail’ command in Unix or Linux do by default?
According to the ’Place Order’ use case, who are classified as the ’actors’?
What does the ’Netstat -p protocol’ command do?
What is the function of the ’ip link show’ command?
What does the SYN_SENT state indicate when using the netstat command?
What does a protocol analyzer do in a SIEM system?
What does the ’journalctl -1’ command do in a Linux system?
What are the two common managerial controls mentioned in the text?
What is the function of sensors in a Security Information and Event Management (SIEM) system?
What is the purpose of User Behavior Analysis in a SIEM system?
What does the /var/log/kern.log file do in Linux?
What is one key feature of NXLog Enterprise Edition that is not included in the Community Edition?
What does Hardening mean in the context of preventative controls?
What types of intrusions can the intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) monitor?
What is the primary function of backups and system recovery in corrective and recovery controls?
What is a common goal of fault tolerance and redundancy techniques in server redundancies?
What starts the use case in the scenario of Lisa purchasing an item online?
What does the ’logger Backup started’ command do according to the text?
What does the ’-n 15’ switch specify when used with the ’sudo tail’ command in relation to the /var/log/messages file?
What do log entries in a system help administrators and security investigators determine?
What does a security incident refer to in IT security?
What does the ’Netstat -s’ command do?
What are some examples of preventative controls?
What are the features of Syslog-ng as an extension of syslogd on Linux-like systems?
What is the purpose of the command ’sudo cat /var/log/auth.log | grep ’authentication failure’’ in a Linux system?
What information does the ’Netstat –r’ command on a system provide?
What does the Linux ’chmod g=r filename’ command do?
Which of the following commands enables promiscuous mode on the first Ethernet interface of a Linux-based system?
Why might a ping command fail even if a system is operational and reachable?
What is the purpose of the correlation engine in a Security Information and Event Management (SIEM) system?
Which of the following is NOT included in operational controls?
What is the correct naming strategy for a use case in systems analysis and software development?
What is the function of ARP?
In the context of a use case, what does the term ’Normal flow’ refer to?
What is the purpose of using encryption as a technical control?
What would be the effect of the ’chmod o-x filename’ command on a Linux system?
What is the primary task of the ’Log Monitoring’ as part of the detective controls?
Which of the following is NOT an example of a detective control?
Which of the following statements best describes a ’precondition condition’ within the context of use cases?
What does the command ’ping gcgapremium.com’ do?
Which of the following is strongly recommended if you do not have a Linux system, according to the information given in the text above?
What are some capabilities of the hping command?
What method is used to provide assurance that data has not changed and thus providing integrity?
Which media protection control best ensures the security of data on physical media like USB flash drives or backup tapes?
What is the main function of detective controls in an organization’s security control system?
What is the main function of detective controls in an organization’s security control system?
What is the function of the ’-c’ switch when used with the ping command on a Linux system?
What does the command ’arp -a 192.168.1.1’ do?
What is the primary function of an Intrusion prevention system (IPS) in the context of preventative controls?
What are the key features of NXLog Enterprise Edition as compared to the Community Edition?
Which log of the operating system records events related to the functioning of the operating system such as when it starts, when it shuts down, and information on services starting and stopping?
What is the purpose of an ’Account disablement policy’?
Which of the following best describes automated triggers in the context of a SIEM system?
In a use case, what is meant by ’Postcondition’?
What type of information does the ’var/log/syslog’ file contain on a Linux system?
What does the ’ipconfig /displaydns’ command do in a Windows system?
What does the correlation engine in a SIEM system do?
Which is the correct description of the command ’ip link set eth0 up’ as per the text above?
What is the purpose of operational controls in organization’s overall security plan?
What does the command netstat -anp tcp show you?
What is the role of Authentication in maintaining confidentiality as per the given text?
What are response controls in the context of security?
What is the primary function of the ’cat’ command in Linux?
What does the ’ifconfig eth0 allmulti’ command enable?
What is the main purpose of a tracert, or traceroute, command?
What is a compensating control as described in the context of network security?
Which of the following accurately describes a function provided by security information and event management (SIEM) systems?
What is the difference between scalability and elasticity in terms of system availability?
What is the role of a syslog collector?
Which statement best describes the meaning of the ’ping -c 4 192.168.1.1’ command?
What are two common types of managerial controls described in the given text?
Which of the following is an example of deterrent control in terms of physical security?
Which of the following is a NOT a common feature of a SIEM system?
Which statement describes operational controls in the context of organizational security?
Which of the following is NOT an example of a technical control?
What does the ’CLOSE_WAIT’ state indicate when using the netstat command?
Which of the following methods is used to ensure confidentiality by scrambling data, thereby making it unreadable to unauthorized personnel?
What is the primary function of the Security log in a Windows system?
What is the primary goal of corrective and recovery controls?
How can you limit the output of the journalctl command to only logs from the last hour?
What does the ’LISTEN’ state in the netstat command indicate?
What does /var/log/httpd/ directory contain in Linux as pointed out by CompTIA Security+ exam?
What is the purpose of power redundancies in ensuring a system’s availability?
Which of the following techniques can be used to ensure data confidentiality?
What is the primary use of the ’Netstat -n’ command?
Which of the following is NOT an example of a preventative control type?
What is the purpose of motion detection as a detective control in terms of security?
Last updated