Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






2. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






3. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?






4. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






5. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






6. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






7. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






8. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






9. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






10. Which of the following control types is video monitoring?






11. Which of the following mitigates the risk of proprietary information being compromised?






12. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






13. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






14. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






15. Which of the following is BEST utilized to actively test security controls on a particular system?






16. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






17. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






18. 3DES is created when which of the following scenarios occurs?






19. Which of the following authentication protocols forces centralized wireless authentication?






20. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






21. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






22. Which of the following is used to verify the identity of the sender of a signed email?






23. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






24. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






25. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






26. Which of the following risks could IT management be mitigating by removing an all-in-one device?






27. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






28. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?






29. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






30. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






31. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia






32. The public key is used to perform which of the following?






33. Which of the following security tools can Starbuck - a security administrator - use to deter theft?






34. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






35. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






36. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?






37. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






38. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?






39. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






40. Which of the following BEST describes a denial of service attack?






41. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






42. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?






43. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






44. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






45. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






46. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






47. Which of the following policies is implemented in order to minimize data loss or theft?






48. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






49. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






50. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?