Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






2. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






3. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






4. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






5. Which of the following activities should be completed in order to detect anomalies on a network?






6. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






7. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






8. Which of the following elements makes up the standard equation used to define risk?






9. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






10. Which of the following is the BEST solution to securely administer remote servers?






11. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






12. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






13. Which of the following is used to verify the identity of the sender of a signed email?






14. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






15. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






16. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the






17. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






18. Which of the following control types is video monitoring?






19. Which of the following implements two factor authentication based on something you know and something you have?






20. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






21. Which of the following security controls enforces user permissions based on a job role?






22. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






23. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






24. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






25. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






26. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






27. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?






28. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






29. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






30. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






31. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?






32. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






33. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






34. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?






35. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






36. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






37. Which of the following BEST describes a denial of service attack?






38. Which of the following BEST explains the security benefit of a standardized server image?






39. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






40. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?






41. Which of the following authentication protocols forces centralized wireless authentication?






42. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






43. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






44. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






45. Which of the following risks could IT management be mitigating by removing an all-in-one device?






46. Which of the following are security relevant policies?






47. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






48. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






49. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






50. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests