Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following malware types is MOST commonly associated with command and control?






2. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






3. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






4. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






5. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






6. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






7. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






8. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






9. An example of a false negative






10. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






11. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






13. Which of the following technologies would allow the removal of a single point of failure?






14. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






15. Which of the following authentication protocols forces centralized wireless authentication?






16. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






17. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






18. Which of the following multifactor authentication methods uses biometrics?






19. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?






20. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






21. Which of the following BEST describes a denial of service attack?






22. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






23. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






24. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






25. Which of the following is BEST utilized to actively test security controls on a particular system?






26. Which of the following control types is video monitoring?






27. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






28. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?






29. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






30. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






31. Which of the following security chips does BitLocker utilize?






32. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






33. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






34. The fundamental information security principals include confidentiality - availability and which of the following?






35. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






36. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






37. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






38. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






39. Which of the following has a default port of 22?






40. Which of the following encrypts the body of a packet - rather than just the password - while sending information?






41. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






42. Which of the following security controls enforces user permissions based on a job role?






43. Which of the following network devices will prevent port scans?






44. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






45. Which of the following is a feature of Kerberos?






46. Hashing algorithms are used to address which of the following?






47. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






48. Which of the following BEST explains the security benefit of a standardized server image?






49. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?






50. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?