SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Passive finger printing
Install both the private and the public key on the web server.
Social engineering
Succession planning
2. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
Install application updates
Fuzzing
NIPS
SSH
3. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Humidity controls
Dictionary; Brute force
The DES algorithm is run three consecutive times against the item being encrypted.
Cross-site scripting
4. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Device encryption
Mitigate risk and develop a maintenance plan.
Antenna placement; Power levels
Mandatory access control
5. Which of the following activities should be completed in order to detect anomalies on a network?
Log reviews
Something you are
Blue jacking
Cable locks
6. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?
CRL
SSH
Change management
TPM
7. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Port forwarding
Gray box
Blowfish
Validate the identity of an email sender;Encrypt messages;Decrypt messages
8. Which of the following elements makes up the standard equation used to define risk?
Zero day attack
Impact; Likelihood
Mitigate risk and develop a maintenance plan.
Encrypt all confidential data.
9. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
Fuzzing
MAC filtering
Cable locks
Zero day attack
10. Which of the following is the BEST solution to securely administer remote servers?
SSH
Rootkit
Separation of duties
Deploying and using a trusted OS
11. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
AP power levels
MAC filtering
Mandatory access control
Establish a MAC limit and age
12. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
Separation of duties
NAC
Humidity controls
Warm site
13. Which of the following is used to verify the identity of the sender of a signed email?
SSH
Public key
Mean time to restore
Sanitization using appropriate software
14. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
P2P
Mandate additional security awareness training for all employees.
Social engineering
Personally owned devices
15. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Personally owned devices
Personal firewall
Fail state of the system
Memory dump - ARP cache
16. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the
Time of day restrictions;Access control lists
Two fish
Cipher lock combination and proximity badge
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
17. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
IV attack
Error handling
It is faster to encrypt an individual file.
18. Which of the following control types is video monitoring?
80
Single point of failure
Detective
Port forwarding
19. Which of the following implements two factor authentication based on something you know and something you have?
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Ask the programmer to replicate the problem in a test environment.
Mean time to restore
Account expiration
20. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee
Risk
PII handling
WPA2-PSK
80
21. Which of the following security controls enforces user permissions based on a job role?
Mitigation
dcfldd
Information classification policy; Network access policy; Auditing and monitoring policy
Group based privileges
22. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?
Software as a Service
SSH
VLAN mismatch is occurring.
IPS
23. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Failsafe
Something you are
E-discovery
Mandatory Access Controls
24. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
Succession planning
Error handling
Risk avoidance
MD5 checksum
25. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
Public key
WPA2-Enterprise
Failsafe
Spam fitters
26. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
MAC filtering
Proxy server
Fuzzing
Mandatory vacations
27. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
SQL injection
Cross-site scripting
Host based firewall
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
28. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
Mandatory access control
Zero day exploit
Cross-site scripting
Port scan
29. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Fraggle attack
Ask the programmer to replicate the problem in a test environment.
GSM phone card and PIN
30. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
Worm outbreak
Clean desk policy
Fraggle attack
Firewall
31. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
PEAP
Deploy an anti-spam device to protect the network.
Shoulder surfing
Full disk encryption
32. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Host based firewall
SQL injection
Full disk
Shoulder surfing
33. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
SNMPv3
Install both the private and the public key on the web server.
AP power levels
Trust model
34. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
WPA2-Enterprise
Rootkit
Dual-homing a server
Compare hashes of the original source and system image.
35. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
NAC
IV attack
To limit the number of endpoints connected through the same switch port
Deploying and using a trusted OS
36. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
80
Mandatory access control
Zero day
Cable locks
37. Which of the following BEST describes a denial of service attack?
Impact; Likelihood
Ticket granting server
Failsafe
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
38. Which of the following BEST explains the security benefit of a standardized server image?
War chalking
Mandated security configurations have been made to the operating system.
TACACS+
Separation of duties
39. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
IPS
NTLM
Impersonation
40. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?
Zero day attack
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Discretionary access control
Spam fitters
41. Which of the following authentication protocols forces centralized wireless authentication?
Blowfish
WPA2-Enterprise
Subnetting
MD5 checksum
42. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Log reviews
Install application updates
Clean desk policy
Ask the programmer to replicate the problem in a test environment.
43. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
Confidentiality
RAID 5 and a storage area network
Risk
Protocol analyzer
44. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator
Gray box
Loop protection
VLAN mismatch is occurring.
MAC filtering
45. Which of the following risks could IT management be mitigating by removing an all-in-one device?
Fuzzing
Warm site
Single point of failure
Mandatory access control
46. Which of the following are security relevant policies?
Information classification policy; Network access policy; Auditing and monitoring policy
Full disk encryption
Integrity
Encrypt all confidential data.
47. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?
Antenna placement; Power levels
Personally owned devices
Signature based
Vulnerability scan
48. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Update the CRL; Deploy OCSP
Anti-spam
Ask the programmer to replicate the problem in a test environment.
Impersonation
49. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
RBAC
Mitigate risk and develop a maintenance plan.
Proxies
Code review
50. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Memory dump - ARP cache
Protocol analyzers
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Impersonation
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests