SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Detective
Fail state of the system
Worm outbreak
2. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from
GSM phone card and PIN
Error handling
Verify the user's identity
23
3. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Separation of duties
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
IV attack
Install application updates
4. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
UDP 53
22
21
WPA2-PSK
5. Which of the following is used to verify the identity of the sender of a signed email?
Public key
Continuous monitoring
PEAP
The security company is provided with no information about the corporate network or physical locations.
6. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
Mandatory access control
Trust model
The DES algorithm is run three consecutive times against the item being encrypted.
Full disk
7. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?
Zero day exploit
Social engineering
Gray box
Mandatory access control
8. The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?
TACACS+
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Shoulder surfing
Signature based
9. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?
Fraggle attack
SSH
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Time of day restrictions;Access control lists
10. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Device encryption
Mean time to restore
File encryption
Clean desk policy
11. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
Botnets
SQL injection
GSM phone card and PIN
Business impact assessment
12. Which of the following technologies would allow the removal of a single point of failure?
Warm site
Dual-homing a server
Port forwarding
Private key
13. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
RAID 5 and a storage area network
Clean desk policy
Impersonation
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
14. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Remote wipe
Mandatory Access Controls
Port scan
SSH
15. Which of the following is BEST utilized to actively test security controls on a particular system?
Continuous monitoring
23
Signature based
Penetration test
16. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
RAID 5 and a storage area network
NTLM
Vulnerability scan
Zero day
17. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
IV attack
TPM
Impersonation
Mandatory access control
18. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Spam filter
MD5
Blue jacking
WPA2-PSK
19. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
Failsafe
The capacity of a system to resist unauthorized changes to stored information
Input validation
Deploying and using a trusted OS
20. Which of the following password policies is the MOST effective against a brute force network attack?
Account lockout
NAC
RBAC
Change management
21. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
PGP
Subnetting
Mandatory access control
Image hashes
22. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
The DES algorithm is run three consecutive times against the item being encrypted.
Remote wipe
Account lockout
Trust model
23. 3DES is created when which of the following scenarios occurs?
SSH
dcfldd
Personally owned devices
The DES algorithm is run three consecutive times against the item being encrypted.
24. Which of the following are restricted to 64-bit block sizes?
Blowfish
The system is virtualized
Vulnerability scan
DES;3 DES
25. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Cable locks
AP power levels
Sanitization using appropriate software
War chalking
26. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Gray box
Key escrow
The IDS does not identify a buffer overflow
Memory dump - ARP cache
27. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?
Verify the user's identity
Subnetting
23
Separation of duties
28. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Zero day exploit
Detective
Deploying and using a trusted OS
Proxy server
29. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Disable unused ports
NIPS
CRL
Full disk
30. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
Error handling
CRL
Rootkit
Software as a Service
31. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Impersonation
Impersonation
Spam fitters
Clustering
32. An example of a false negative
Mandatory Access Controls
It is faster to encrypt an individual file.
The IDS does not identify a buffer overflow
Mandatory vacations
33. Which of the following implements two factor authentication based on something you know and something you have?
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Loop protection
Mandatory vacations
Single point of failure
34. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
Code review
Error handling
Remote wipe
Penetration test
35. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
MAC filtering
Impact; Likelihood
Protocol analyzer
Verify the user's identity
36. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
To limit the number of endpoints connected through the same switch port
PGP
Mandated security configurations have been made to the operating system.
Loop protection
37. Which of the following is where an unauthorized device is found allowing access to a network?
Fuzzing
Rogue access point
RAS
Dictionary; Brute force
38. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Dictionary; Brute force
RAS
Account lockout
39. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
IPS
Non-repudiation
Application hardening
Fraggle attack
40. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Clustering
TACACS+; SSH
Social engineering
WPA2-Enterprise
41. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?
Change management
Full disk encryption
IV attack
Impersonation
42. Which of the following combinations represents multifactor authentication?
Rogue access point
Separation of duties
Antenna placement; Power levels
Cipher lock combination and proximity badge
43. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Dictionary; Brute force
NIPS
LDAP
Zero day
44. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
CRL
21
RADIUS
MD5
45. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?
Personal firewall
Use Starbuck's private key to sign the binary
80
Subnetting
46. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
22
The system is virtualized
AP power levels
Install both the private and the public key on the web server.
47. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
Clean desk policy
Deploy an anti-spam device to protect the network.
Two fish
Remotely initiate a device wipe
48. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
Risk
Memory dump - ARP cache
Use Starbuck's private key to sign the binary
Remote wipe
49. Which of the following is a feature of Kerberos?
AP power levels
Separation of duties
Fail state of the system
Single sign-on
50. An SQL injection vulnerability can be caused by which of the following?
TACACS+
Log reviews
CA
Improper input validation