Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






2. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






3. Which of the following security controls enforces user permissions based on a job role?






4. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






5. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






6. Which of the following is a best practice when securing a switch from physical access?






7. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?






8. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






9. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






10. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


11. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






12. Which of the following accurately describes the STRONGEST multifactor authentication?






13. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






14. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






15. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






16. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






17. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?






18. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






19. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






20. Hashing algorithms are used to address which of the following?






21. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






22. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS






23. Which of the following password policies is the MOST effective against a brute force network attack?






24. Which of the following is a feature of Kerberos?






25. The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?






26. Which of the following combinations represents multifactor authentication?






27. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






28. Which of the following is BEST utilized to actively test security controls on a particular system?






29. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






30. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?






31. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






32. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






33. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






35. Which of the following is the purpose of the spanning tree protocol?






36. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






37. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






39. Which of the following mitigates the risk of proprietary information being compromised?






40. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






41. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?






42. Which of the following is the BEST solution to securely administer remote servers?






43. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






44. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






45. Which of the following elements makes up the standard equation used to define risk?






46. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






47. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






48. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






49. Which of the following activities should be completed in order to detect anomalies on a network?






50. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho