Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






2. Which of the following mitigates the risk of proprietary information being compromised?






3. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






4. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






5. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?






6. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






7. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?






8. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






9. Which of the following practices reduces the attack surface of a wireless network?






10. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?






11. Which of the following implements two factor authentication based on something you know and something you have?






12. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






13. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






14. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






15. A packet filtering firewall can protect from which of the following?






16. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






17. Which of the following security chips does BitLocker utilize?






18. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


19. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






20. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?






21. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






22. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






23. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?






24. Which of the following is a feature of Kerberos?






25. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






26. Which of the following security controls enforces user permissions based on a job role?






27. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






28. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






29. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






30. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...






31. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






32. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?






33. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut






34. Which of the following is a best practice when securing a switch from physical access?






35. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






36. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






37. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






38. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






39. A valid server-role in a Kerberos authentication system






40. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






41. Which of the following is where an unauthorized device is found allowing access to a network?






42. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho






43. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






44. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






45. The fundamental information security principals include confidentiality - availability and which of the following?






46. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






47. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






48. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






49. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






50. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests