SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
Fuzzing
Subnetting
Remote wipe
Deploy an anti-spam device to protect the network.
2. Which of the following is the purpose of the spanning tree protocol?
Cipher lock combination and proximity badge
Install application updates
Loop protection
Blowfish
3. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
Shoulder surfing
Trust model
Key escrow
Warm site
4. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
Clustering
SSH
Host based firewall
Software as a Service
5. Which of the following encrypts the body of a packet - rather than just the password - while sending information?
Cold site
TACACS+
Port scan
NIPS
6. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
Log reviews
23
Detective
MD5 checksum
7. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi
Host based firewall
Cable locks
22
P2P
8. Which of the following security controls enforces user permissions based on a job role?
Private key
War chalking
Group based privileges
The DES algorithm is run three consecutive times against the item being encrypted.
9. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Antenna placement; Power-level control
Antenna placement; Power levels
Impersonation
Mandated security configurations have been made to the operating system.
10. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Gray box
Protocol analyzers
CRL
DES;3 DES
11. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
PEAP
Antenna placement; Power-level control
Code review
Host based firewall
12. Which of the following combinations represents multifactor authentication?
Mandatory access control
Cipher lock combination and proximity badge
SQL injection
Mitigation
13. Which of the following BEST explains the security benefit of a standardized server image?
MD5
80
Mandated security configurations have been made to the operating system.
Update the CRL; Deploy OCSP
14. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
Loop protection
Mandatory vacations
Continuous monitoring
Mandated security configurations have been made to the operating system.
15. Which of the following mitigates the risk of proprietary information being compromised?
File encryption
Information classification policy; Network access policy; Auditing and monitoring policy
Proxy server
Impact; Likelihood
16. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?
Deploy an anti-spam device to protect the network.
Mandated security configurations have been made to the operating system.
Mitigate risk and develop a maintenance plan.
E-discovery
17. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
SNMPv3
Separation of duties
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Ticket granting server
18. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
Cold site
The IDS does not identify a buffer overflow
Cross-site scripting
SNMPv3
19. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?
The system is virtualized
Mitigation
VLAN mismatch is occurring.
TPM
20. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?
NTLM
Zero day exploit
Fraggle attack
Personal firewall
21. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
WPA2-PSK
P2P
Subnetting
PEAP-MSCHAPv2
22. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Install application updates
Cross-site scripting
Deploying and using a trusted OS
Ticket granting server
23. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Impersonation
Key escrow
TACACS+; SSH
Establish a MAC limit and age
24. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?
SNMPv3
Zero day
Zero day exploit
The IDS does not identify a buffer overflow
25. Which of the following has a default port of 22?
Deploying and using a trusted OS
CRL
SSH
Key escrow
26. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
RADIUS
Vulnerability scan
PGP
ARP poisoning
27. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the
Dual-homing a server
Gray box
SSH
MAC filtering
28. Which of the following does Starbuck - a software developer - need to do after compiling the source code of a program to attest the authorship of the binary?
29. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Impersonation
CRL
The system is virtualized
30. Which of the following is BEST associated with PKI?
Impact; Likelihood
Blue jacking
Private key
Dictionary; Brute force
31. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
GSM phone card and PIN
MAC filtering
Loop protection
Change management
32. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Social engineering
NIPS
AP power levels
Continuous monitoring
33. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Error handling
Rootkit
Confidentiality
PII handling
34. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
NIPS
Input validation
Cross-site scripting
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
35. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee
WPA2-PSK
Key escrow
Clustering
The capacity of a system to resist unauthorized changes to stored information
36. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
22
Separation of duties
21
Single sign-on
37. Which of the following policies is implemented in order to minimize data loss or theft?
PII handling
Continuous monitoring
Cross-site scripting
Server-side input validation results in a more secure system than client-side input validation.
38. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?
Separation of duties
Log reviews
Dictionary; Brute force
Failsafe
39. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
CRL
Remote data wipe
The security company is provided with no information about the corporate network or physical locations.
Separation of duties
40. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Something you are - something you have
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Deploying and using a trusted OS
41. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
Application hardening
Impact; Likelihood
Fuzzing
Impersonation
42. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin
Host based firewall
WPA2-PSK
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
43. Which of the following malware types is MOST commonly associated with command and control?
War chalking
Input validation
Botnets
Account lockout
44. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
Anti-spam
Impersonation
Account lockout
Fail state of the system
45. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Impact; Likelihood
Public key
Gray box
Install both the private and the public key on the web server.
46. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
RAID 5 and a storage area network
Succession planning
Notify security to identify employee's whereabouts.
23
47. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
Clean desk policy
RAS
Separation of duties
Failsafe
48. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Separation of duties
Memory dump - ARP cache
RADIUS
TPM
49. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks
War chalking
Input validation
Separation of duties
UDP 53
50. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Ask the programmer to replicate the problem in a test environment.
Install application updates
Dual-homing a server
Blue jacking