SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Impersonation
SQL injection
Zero day
22
2. Which of the following mitigates the risk of proprietary information being compromised?
Something you are
NIPS
File encryption
The capacity of a system to resist unauthorized changes to stored information
3. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Notify security to identify employee's whereabouts.
Subnetting
Remote wipe
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
4. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
Power levels
21
Discretionary access control
Clean desk policy
5. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
The intermediate CA's public key
23
Mandate additional security awareness training for all employees.
Sanitization using appropriate software
6. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
NIPS
Improper input validation
Mandated security configurations have been made to the operating system.
Antenna placement; Power levels
7. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?
PGP
E-discovery
Risk
Account lockout
8. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Warm site
Antenna placement; Power levels
RBAC
PEAP-MSCHAPv2
9. Which of the following practices reduces the attack surface of a wireless network?
Clustering
Gray box
SQL injection
Antenna placement; Power-level control
10. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?
80
Zero day attack
Two fish
Deploy an anti-spam device to protect the network.
11. Which of the following implements two factor authentication based on something you know and something you have?
Port scan
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Use Starbuck's private key to sign the binary
Evil twin
12. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
Two fish
The system is virtualized
Risk
Vishing
13. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the
The capacity of a system to resist unauthorized changes to stored information
Gray box
The intermediate CA's public key
SSH
14. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
Blowfish
Signature based
Update the CRL; Deploy OCSP
Humidity controls
15. A packet filtering firewall can protect from which of the following?
Antenna placement; Power-level control
Port scan
The system is virtualized
NAC
16. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Full disk
Private key
Confidentiality
Spam filter
17. Which of the following security chips does BitLocker utilize?
The system is virtualized
Logic bomb
Firewall
TPM
18. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Mandated security configurations have been made to the operating system.
Personal firewall
Passive finger printing
WPA2-PSK
20. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
PGP
Remote wipe
Anti-spam
Penetration testing
21. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Ask the programmer to replicate the problem in a test environment.
Deploying and using a trusted OS
Succession planning
Device encryption
22. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
Mandatory access control
Full disk
Vishing
Power levels
23. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?
Cold site
Port forwarding
NIPS
UDP 53
24. Which of the following is a feature of Kerberos?
Temperature and humidity controls
Risk
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Single sign-on
25. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
Mandatory access control
Dictionary; Brute force
Business impact assessment
Impersonation
26. Which of the following security controls enforces user permissions based on a job role?
Impersonation
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Group based privileges
Detective
27. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
NIPS
Install application updates
Mandated security configurations have been made to the operating system.
Deploy an anti-spam device to protect the network.
28. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Memory dump - ARP cache
RADIUS
Mandate additional security awareness training for all employees.
Mandated security configurations have been made to the operating system.
29. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Mitigate risk and develop a maintenance plan.
Cold site
MD5
Penetration test
30. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...
Code review
Encrypt all confidential data.
RAS
NAC
31. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?
Software as a Service
22
Fail state of the system
NTLM
32. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?
Vishing
War chalking
Change management
TACACS+; SSH
33. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Assign multiple roles to the existing user ID
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Key escrow
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
34. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Separation of duties
VLAN mismatch is occurring.
21
35. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?
Continuous monitoring
Key escrow
Log reviews
Temperature and humidity controls
36. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
Impersonation
Image hashes
Mandatory vacations
It is faster to encrypt an individual file.
37. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Remote wipe
Log reviews
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Humidity controls
38. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?
Fraggle attack
Mitigation
Private key
VLAN mismatch is occurring.
39. A valid server-role in a Kerberos authentication system
Ticket granting server
The DES algorithm is run three consecutive times against the item being encrypted.
Mandatory vacations
SNMPv3
40. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?
Evil twin
SQL injection
Proxies
PEAP-MSCHAPv2
41. Which of the following is where an unauthorized device is found allowing access to a network?
NIPS
Impersonation
Rogue access point
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
42. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
Mitigate risk and develop a maintenance plan.
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
GSM phone card and PIN
Ask the programmer to replicate the problem in a test environment.
43. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?
Firewall
dcfldd
The IDS does not identify a buffer overflow
Port scanner
44. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Social engineering
AP power levels
Impact; Likelihood
Mandate additional security awareness training for all employees.
45. The fundamental information security principals include confidentiality - availability and which of the following?
Passive finger printing
The capacity of a system to resist unauthorized changes to stored information
Application hardening
Protocol analyzers
46. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
Fuzzing
Personal firewall
SNMPv3
80
47. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
PEAP
Remote wipe
Compare hashes of the original source and system image.
Time of day restrictions;Access control lists
48. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?
IV attack
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Separation of duties
Botnets
49. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Verify the user's identity
Time of day restrictions;Access control lists
Cross-site scripting
Install application updates
50. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Deploy an anti-spam device to protect the network.
Succession planning
DES;3 DES
MD5 checksum
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests