Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






2. Which of the following is the purpose of the spanning tree protocol?






3. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






4. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?






5. Which of the following encrypts the body of a packet - rather than just the password - while sending information?






6. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






7. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






8. Which of the following security controls enforces user permissions based on a job role?






9. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






10. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






11. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






12. Which of the following combinations represents multifactor authentication?






13. Which of the following BEST explains the security benefit of a standardized server image?






14. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






15. Which of the following mitigates the risk of proprietary information being compromised?






16. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?






17. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






18. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






19. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






20. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?






21. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






22. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






23. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






24. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?






25. Which of the following has a default port of 22?






26. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?






27. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






28. Which of the following does Starbuck - a software developer - need to do after compiling the source code of a program to attest the authorship of the binary?


29. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






30. Which of the following is BEST associated with PKI?






31. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






32. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






33. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






34. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






35. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






36. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






37. Which of the following policies is implemented in order to minimize data loss or theft?






38. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






39. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia






40. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






41. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?






42. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






43. Which of the following malware types is MOST commonly associated with command and control?






44. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






45. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






46. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






47. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






48. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






49. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






50. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?