Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following technologies would allow the removal of a single point of failure?






2. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






3. Which of the following is a feature of Kerberos?






4. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






5. Which of the following authentication protocols forces centralized wireless authentication?






6. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?






7. Which of the following BEST explains the security benefit of a standardized server image?






8. Which of the following is a reason why Mal - a security administrator - would implement port security?






9. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






10. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






11. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?






12. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






13. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






14. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






15. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






16. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






17. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






18. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






19. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






20. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






21. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






22. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho






23. Which of the following activities should be completed in order to detect anomalies on a network?






24. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






25. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?






26. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the






27. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?






28. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






29. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?






30. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






31. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






32. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






33. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS






34. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?






35. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






36. Which of the following should River Tam - a security technician - perform as the FIRST step when creating a disaster recovery plan for a mission critical accounting system?






37. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






38. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






39. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






40. Which of the following practices reduces the attack surface of a wireless network?






41. Which of the following is the purpose of the spanning tree protocol?






42. Which of the following malware types is MOST commonly associated with command and control?






43. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






44. Which of the following control types is video monitoring?






45. Which of the following is based on X.500 standards?






46. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?






47. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






48. Which of the following allows a server to request a website on behalf of Starbuck - a user?






49. Which of the following BEST describes a denial of service attack?






50. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?