SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Key escrow
23
Port forwarding
Humidity controls
2. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
GSM phone card and PIN
Botnets
The system is virtualized
Single point of failure
3. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS
RAID 5 and a storage area network
Key escrow
PEAP-MSCHAPv2
Protocol analyzer
4. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
SQL injection
Fuzzing
Protocol analyzer
Port scanner
5. Which of the following is the purpose of the spanning tree protocol?
Separation of duties
Loop protection
Account lockout
Antenna placement; Power-level control
6. The public key is used to perform which of the following?
Validate the identity of an email sender;Encrypt messages;Decrypt messages
RAID 5 and a storage area network
To limit the number of endpoints connected through the same switch port
Rogue access point
7. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Subnetting
Mandate additional security awareness training for all employees.
Spam fitters
Mitigation
8. Which of the following encrypts the body of a packet - rather than just the password - while sending information?
Cross-site scripting
To limit the number of endpoints connected through the same switch port
TACACS+
Proxy server
9. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Separation of duties
Image hashes
RADIUS
SSH
10. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...
Something you are - something you have
Separation of duties
Key escrow
LDAP
11. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
Trust model
TACACS+; SSH
Device encryption
Non-repudiation
12. Which of the following has a default port of 22?
The DES algorithm is run three consecutive times against the item being encrypted.
Mitigation
CRL
SSH
13. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Mandate additional security awareness training for all employees.
Install application updates
Establish a MAC limit and age
Mandated security configurations have been made to the operating system.
14. 3DES is created when which of the following scenarios occurs?
The DES algorithm is run three consecutive times against the item being encrypted.
Ask the programmer to replicate the problem in a test environment.
File encryption
LDAP
15. Which of the following is BEST utilized to actively test security controls on a particular system?
Vishing
SSH
Group based privileges
Penetration test
16. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
PGP
Compare hashes of the original source and system image.
File encryption
IPS
17. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?
Mandatory Access Controls
Update the CRL; Deploy OCSP
Server-side input validation results in a more secure system than client-side input validation.
Social engineering
18. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Install both the private and the public key on the web server.
SQL injection
Spam fitters
Trust model
19. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
Spam filter
21
Shoulder surfing
Something you are
20. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Software as a Service
Penetration test
WPA2-PSK
21. Which of the following malware types is MOST commonly associated with command and control?
Single sign-on
Botnets
Clean desk policy
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
22. Which of the following is BEST associated with PKI?
Signature based
Image hashes
Private key
PGP
23. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Disable unused ports
The security company is provided with no information about the corporate network or physical locations.
Clean desk policy
Sanitization using appropriate software
24. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
MD5
Error handling
GSM phone card and PIN
Power levels
25. Which of the following accurately describes the STRONGEST multifactor authentication?
Full disk
Something you are - something you have
Antenna placement; Power levels
ARP poisoning
26. Which of the following are security relevant policies?
Assign multiple roles to the existing user ID
Information classification policy; Network access policy; Auditing and monitoring policy
Firewall
Mitigate risk and develop a maintenance plan.
27. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
Deploying and using a trusted OS
Mean time to restore
GSM phone card and PIN
Worm outbreak
28. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee
WPA2-PSK
dcfldd
Time of day restrictions;Access control lists
Passive finger printing
29. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?
Single point of failure
Zero day exploit
Fail state of the system
Account expiration
30. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Protocol analyzers
Memory dump - ARP cache
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Clustering
32. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Mandatory Access Controls
The IDS does not identify a buffer overflow
Antenna placement; Power levels
Integrity
33. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Firewall
Botnets
MD5 checksum
34. Which of the following technologies would allow the removal of a single point of failure?
SQL injection
Ask the programmer to replicate the problem in a test environment.
Dual-homing a server
dcfldd
35. Which of the following is used to verify the identity of the sender of a signed email?
Public key
The security company is provided with no information about the corporate network or physical locations.
Personally owned devices
Gray box
36. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Logic bomb
Vulnerability scan
PEAP-MSCHAPv2
Trust model
37. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Account lockout
GSM phone card and PIN
TACACS+
Error handling
38. Which of the following security controls enforces user permissions based on a job role?
Port scan
IV attack
Group based privileges
Succession planning
39. Which of the following multifactor authentication methods uses biometrics?
Something you are
Encrypt all confidential data.
Non-repudiation
Ticket granting server
40. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Port scanner
Gray box
CA
VLAN mismatch is occurring.
41. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Blue jacking
Antenna placement; Power-level control
Deploying and using a trusted OS
Spam filter
42. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
DES;3 DES
Clean desk policy
Group based privileges
Memory dump - ARP cache
43. The fundamental information security principals include confidentiality - availability and which of the following?
PEAP
The capacity of a system to resist unauthorized changes to stored information
MD5 checksum
Signature based
44. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Account lockout
Botnets
Humidity controls
Spam filter
45. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Server-side input validation results in a more secure system than client-side input validation.
E-discovery
MAC filtering
46. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
23
Subnetting
MD5
Change management
47. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?
Port scan
PGP
GSM phone card and PIN
RBAC
48. Which of the following risks could IT management be mitigating by removing an all-in-one device?
Single point of failure
The system is virtualized
CRL
Account lockout
49. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
Image hashes
Server-side input validation results in a more secure system than client-side input validation.
PEAP
Trust model
50. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?
IV attack
Information classification policy; Network access policy; Auditing and monitoring policy
Power levels
The capacity of a system to resist unauthorized changes to stored information
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests