SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
NAC
PGP
Continuous monitoring
Device encryption
2. Which of the following is BEST utilized to actively test security controls on a particular system?
Group based privileges
Protocol analyzers
TACACS+
Penetration test
3. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Install application updates
NIPS
Clean desk policy
Full disk
4. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
Two fish
Protocol analyzer
Single sign-on
Integrity
5. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
War chalking
TACACS+
Rootkit
Port forwarding
6. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Disable unused ports
Cross-site scripting
Establish a MAC limit and age
Mandatory Access Controls
7. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Spam fitters
RAS
23
DES;3 DES
8. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...
Deploying and using a trusted OS
The DES algorithm is run three consecutive times against the item being encrypted.
Protocol analyzers
RAS
9. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Account expiration
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
TACACS+; SSH
10. A valid server-role in a Kerberos authentication system
Cipher lock combination and proximity badge
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Loop protection
Ticket granting server
11. Which of the following reduces the likelihood of a single point of failure when a server fails?
Application hardening
Clustering
Spam filter
Business impact assessment
12. The public key is used to perform which of the following?
MD5
23
Server-side input validation results in a more secure system than client-side input validation.
Validate the identity of an email sender;Encrypt messages;Decrypt messages
13. Which of the following is an improved version of the LANMAN hash?
NTLM
Something you are
Application hardening
22
14. Which of the following password policies is the MOST effective against a brute force network attack?
Dictionary; Brute force
Impersonation
WPA2-Enterprise
Account lockout
15. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Worm outbreak
The system is virtualized
To limit the number of endpoints connected through the same switch port
Zero day
16. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
CRL
Antenna placement; Power levels
SSH
Passive finger printing
17. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the
Social engineering
Time of day restrictions;Access control lists
Port scanner
Antenna placement; Power-level control
18. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Protocol analyzers
Code review
Cipher lock combination and proximity badge
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
19. Which of the following activities should be completed in order to detect anomalies on a network?
File encryption
Log reviews
80
Cable locks
20. Which of the following security controls enforces user permissions based on a job role?
Mean time to restore
Group based privileges
Spam fitters
Botnets
21. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
Protocol analyzers
MAC filtering
GSM phone card and PIN
Detective
22. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?
Impact; Likelihood
TACACS+
IPS
Spam filter
23. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
Succession planning
Mandatory access control
Change management
NTLM
24. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
War chalking
MD5 checksum
Two fish
Change management
25. Which of the following is where an unauthorized device is found allowing access to a network?
Rogue access point
Proxy server
21
Something you are - something you have
26. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
PII handling
Mitigation
Account expiration
Integrity
27. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
Fuzzing
Public key
Fraggle attack
Remote data wipe
28. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?
SSH
80
Discretionary access control
Failsafe
29. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
Log reviews
Penetration testing
Install application updates
30. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
Port scan
Separation of duties
Host based firewall
Log reviews
31. Which of the following is used to verify the identity of the sender of a signed email?
Anti-spam
Public key
Confidentiality
P2P
32. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?
Establish a MAC limit and age
Cable locks
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Mandatory access control
33. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Rogue access point
Clean desk policy
Antenna placement; Power-level control
Establish a MAC limit and age
34. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?
Protocol analyzers
Loop protection
NIPS
Install application updates
35. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Personal firewall
CA
Mandatory access control
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
36. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?
Install application updates
The DES algorithm is run three consecutive times against the item being encrypted.
Impersonation
Evil twin
37. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Remote wipe
Install application updates
Subnetting
Rootkit
39. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Vulnerability scan
Software as a Service
To limit the number of endpoints connected through the same switch port
Confidentiality
40. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?
TACACS+; SSH
Information classification policy; Network access policy; Auditing and monitoring policy
The intermediate CA's public key
IPS
41. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Protocol analyzer
Logic bomb
Shoulder surfing
Discretionary access control
42. Which of the following is a best practice when securing a switch from physical access?
Mandatory vacations
PII handling
Disable unused ports
Key escrow
43. Which of the following control types is video monitoring?
Mitigate risk and develop a maintenance plan.
Mandated security configurations have been made to the operating system.
Key escrow
Detective
44. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Spam filter
Social engineering
Impersonation
45. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?
Cold site
Gray box
Ticket granting server
Change management
46. Which of the following are security relevant policies?
SSH
Information classification policy; Network access policy; Auditing and monitoring policy
Zero day attack
80
47. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Personal firewall
Key escrow
Blue jacking
Vishing
48. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
Cold site
Mandate additional security awareness training for all employees.
Worm outbreak
Protocol analyzer
49. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
SNMPv3
RBAC
Discretionary access control
ARP poisoning
50. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
Single point of failure
Rootkit
Fuzzing
GSM phone card and PIN