Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






2. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






3. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






4. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






5. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






6. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






7. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






8. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?






9. Which of the following elements makes up the standard equation used to define risk?






10. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






11. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






12. Which of the following is BEST associated with PKI?






13. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






14. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






15. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






16. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






17. Which of the following reduces the likelihood of a single point of failure when a server fails?






18. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?






19. Which of the following is a reason why Mal - a security administrator - would implement port security?






20. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






21. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






22. Which of the following is the BEST solution to securely administer remote servers?






23. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?






24. Which of the following accurately describes the STRONGEST multifactor authentication?






25. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






26. Which of the following are restricted to 64-bit block sizes?






27. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






28. Which of the following implements two factor authentication based on something you know and something you have?






29. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






30. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






31. Which of the following network devices will prevent port scans?






32. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






33. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






34. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






35. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






36. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






37. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






38. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






39. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






40. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






41. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th






42. Which of the following authentication protocols forces centralized wireless authentication?






43. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






44. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






45. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






46. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?






47. Which of the following are security relevant policies?






48. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






49. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






50. Which of the following security tools can Starbuck - a security administrator - use to deter theft?