Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?






2. Which of the following is BEST utilized to actively test security controls on a particular system?






3. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






4. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






5. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?






6. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






7. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?






8. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...






9. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






10. A valid server-role in a Kerberos authentication system






11. Which of the following reduces the likelihood of a single point of failure when a server fails?






12. The public key is used to perform which of the following?






13. Which of the following is an improved version of the LANMAN hash?






14. Which of the following password policies is the MOST effective against a brute force network attack?






15. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






16. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






17. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the






18. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






19. Which of the following activities should be completed in order to detect anomalies on a network?






20. Which of the following security controls enforces user permissions based on a job role?






21. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






22. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?






23. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






24. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






25. Which of the following is where an unauthorized device is found allowing access to a network?






26. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?






27. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






28. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?






29. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






30. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?






31. Which of the following is used to verify the identity of the sender of a signed email?






32. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






33. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






34. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?






35. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






36. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






37. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


38. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






39. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






40. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?






41. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






42. Which of the following is a best practice when securing a switch from physical access?






43. Which of the following control types is video monitoring?






44. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






45. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?






46. Which of the following are security relevant policies?






47. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






48. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






49. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






50. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?