SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following malware types is MOST commonly associated with command and control?
Botnets
Antenna placement; Power-level control
Full disk encryption
22
2. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
It is faster to encrypt an individual file.
PEAP-MSCHAPv2
MD5
Anti-spam
3. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi
Impersonation
P2P
Worm outbreak
PII handling
4. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
Port forwarding
Mandatory access control
Cable locks
Host based firewall
5. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
Cross-site scripting
PII handling
Worm outbreak
Proxies
6. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Application hardening
Personal firewall
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Impersonation
7. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the
Gray box
Cipher lock combination and proximity badge
Failsafe
Penetration testing
8. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Improper input validation
Sanitization using appropriate software
Remote data wipe
Zero day attack
9. An example of a false negative
Non-repudiation
Host based firewall
The IDS does not identify a buffer overflow
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
10. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
CA
E-discovery
Penetration testing
Mandatory Access Controls
11. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
22
IPS
Compare hashes of the original source and system image.
Full disk
13. Which of the following technologies would allow the removal of a single point of failure?
Zero day exploit
Verify the user's identity
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Dual-homing a server
14. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
LDAP
Spam fitters
Mandatory vacations
Subnetting
15. Which of the following authentication protocols forces centralized wireless authentication?
Port scan
Firewall
Notify security to identify employee's whereabouts.
WPA2-Enterprise
16. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?
Sanitization using appropriate software
UDP 53
Vishing
Shoulder surfing
17. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Blue jacking
War chalking
Clustering
Software as a Service
18. Which of the following multifactor authentication methods uses biometrics?
SQL injection
Something you are
Confidentiality
Information classification policy; Network access policy; Auditing and monitoring policy
19. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?
MAC filtering
Anti-spam
Cipher lock combination and proximity badge
Change management
20. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
Port scan
Loop protection
Two fish
The intermediate CA's public key
21. Which of the following BEST describes a denial of service attack?
Dictionary; Brute force
The IDS does not identify a buffer overflow
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
NIPS
22. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
SQL injection
NAC
Integrity
To limit the number of endpoints connected through the same switch port
23. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
Fuzzing
Account lockout
Cold site
Protocol analyzer
24. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Confidentiality
Temperature and humidity controls
Rogue access point
Trust model
25. Which of the following is BEST utilized to actively test security controls on a particular system?
Penetration test
Something you are - something you have
Discretionary access control
Remote wipe
26. Which of the following control types is video monitoring?
Impact; Likelihood
Detective
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Dual-homing a server
27. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Impersonation
VLAN mismatch is occurring.
Key escrow
Antenna placement; Power-level control
28. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
PEAP
Impersonation
NTLM
Fuzzing
29. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
TACACS+
Code review
Separation of duties
SNMPv3
30. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
Mitigate risk and develop a maintenance plan.
Shoulder surfing
22
NIPS
31. Which of the following security chips does BitLocker utilize?
Input validation
CA
Gray box
TPM
32. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Protocol analyzers
Port scan
Succession planning
Penetration test
33. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
Fail state of the system
Fuzzing
RBAC
Software as a Service
34. The fundamental information security principals include confidentiality - availability and which of the following?
PGP
The capacity of a system to resist unauthorized changes to stored information
Integrity
Sanitization using appropriate software
35. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
Full disk
Image hashes
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
21
36. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
Ticket granting server
Humidity controls
SSH
MAC filtering
37. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Zero day attack
NIPS
Protocol analyzers
Memory dump - ARP cache
38. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?
Input validation
Continuous monitoring
Key escrow
Personally owned devices
39. Which of the following has a default port of 22?
Logic bomb
SSH
ARP poisoning
Vulnerability scan
40. Which of the following encrypts the body of a packet - rather than just the password - while sending information?
TACACS+
Install both the private and the public key on the web server.
Confidentiality
Something you are
41. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Impersonation
WPA2-PSK
Account lockout
Mitigation
42. Which of the following security controls enforces user permissions based on a job role?
Group based privileges
Impact; Likelihood
CA
dcfldd
43. Which of the following network devices will prevent port scans?
Discretionary access control
Firewall
Risk avoidance
Spam fitters
44. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
Spam filter
Mandated security configurations have been made to the operating system.
NIPS
Port forwarding
45. Which of the following is a feature of Kerberos?
Single sign-on
VLAN mismatch is occurring.
Worm outbreak
It is faster to encrypt an individual file.
46. Hashing algorithms are used to address which of the following?
Vulnerability scan
Integrity
P2P
Clean desk policy
47. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Risk avoidance
Clean desk policy
Single point of failure
Discretionary access control
48. Which of the following BEST explains the security benefit of a standardized server image?
22
Install application updates
Mandated security configurations have been made to the operating system.
Dual-homing a server
49. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
The security company is provided with no information about the corporate network or physical locations.
Protocol analyzers
Penetration testing
Temperature and humidity controls
50. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
Ask the programmer to replicate the problem in a test environment.
Mandate additional security awareness training for all employees.
SNMPv3
Separation of duties