Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is a best practice when securing a switch from physical access?






2. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






3. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






4. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






5. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?






6. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






7. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






8. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






9. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






10. Which of the following is based on X.500 standards?






11. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






12. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?






13. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






14. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?






15. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






16. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






17. Which of the following is the MOST important security requirement for mobile devices storing PII?






18. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






19. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






20. Which of the following BEST describes a denial of service attack?






21. Which of the following activities should be completed in order to detect anomalies on a network?






22. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






23. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






24. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






25. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






26. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?






27. Which of the following password policies is the MOST effective against a brute force network attack?






28. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






29. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






30. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






31. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






32. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






33. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






34. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






35. 3DES is created when which of the following scenarios occurs?






36. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






37. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






38. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






39. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






40. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






41. Which of the following control types is video monitoring?






42. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






43. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS






44. Which of the following accurately describes the STRONGEST multifactor authentication?






45. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






46. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






47. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






48. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






49. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






50. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?