SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are restricted to 64-bit block sizes?
Port forwarding
Antenna placement; Power-level control
Dictionary; Brute force
DES;3 DES
2. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Fuzzing
Device encryption
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Mandatory access control
3. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
Account expiration
E-discovery
Code review
Remote wipe
4. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?
CA
UDP 53
Mitigate risk and develop a maintenance plan.
Non-repudiation
5. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Establish a MAC limit and age
Ask the programmer to replicate the problem in a test environment.
TACACS+; SSH
Rogue access point
6. Which of the following reduces the likelihood of a single point of failure when a server fails?
Fraggle attack
Clustering
NAC
Detective
7. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Image hashes
Sanitization using appropriate software
21
CRL
8. Which of the following BEST describes a denial of service attack?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Confidentiality
Code review
Failsafe
9. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
Remote data wipe
Cipher lock combination and proximity badge
Ask the programmer to replicate the problem in a test environment.
Separation of duties
10. Which of the following is the BEST solution to securely administer remote servers?
23
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
GSM phone card and PIN
SSH
11. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Something you are - something you have
Clean desk policy
RAS
Discretionary access control
12. Which of the following control types is video monitoring?
Remotely initiate a device wipe
Port scan
Detective
Key escrow
13. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
Non-repudiation
Impersonation
MD5 checksum
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
14. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Failsafe
Succession planning
Cross-site scripting
IV attack
15. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
Mandatory vacations
Remote data wipe
Mandatory access control
Deploy an anti-spam device to protect the network.
16. A valid server-role in a Kerberos authentication system
Zero day attack
Botnets
Ticket granting server
Fraggle attack
17. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?
It is faster to encrypt an individual file.
Encrypt all confidential data.
Spam filter
TACACS+
18. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Ticket granting server
Mandatory access control
Antenna placement; Power levels
Log reviews
19. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Full disk encryption
Validate the identity of an email sender;Encrypt messages;Decrypt messages
23
Time of day restrictions;Access control lists
20. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
Cold site
Full disk
Blue jacking
Application hardening
21. Which of the following authentication protocols forces centralized wireless authentication?
Protocol analyzers
Separation of duties
WPA2-Enterprise
Zero day attack
22. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
Use Starbuck's private key to sign the binary
Vulnerability scan
To limit the number of endpoints connected through the same switch port
Mandatory access control
23. Which of the following practices reduces the attack surface of a wireless network?
Fail state of the system
Antenna placement; Power-level control
Deploy an anti-spam device to protect the network.
Zero day exploit
24. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Mandatory Access Controls
Blue jacking
Rogue access point
Encrypt all confidential data.
25. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?
26. Which of the following is the MAIN benefit of server-side versus client-side input validation?
Integrity
Separation of duties
Server-side input validation results in a more secure system than client-side input validation.
TACACS+
27. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Antenna placement; Power-level control
Improper input validation
Fraggle attack
Confidentiality
28. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
The DES algorithm is run three consecutive times against the item being encrypted.
Mandatory access control
Remotely initiate a device wipe
Mean time to restore
29. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
Loop protection
21
Remote wipe
NIPS
30. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?
War chalking
Key escrow
Mandatory access control
Separation of duties
31. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Protocol analyzers
MD5
ARP poisoning
Compare hashes of the original source and system image.
32. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
Risk
Application hardening
Ask the programmer to replicate the problem in a test environment.
Account expiration
33. Which of the following should be done before resetting a user's password due to expiration?
34. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Dictionary; Brute force
Assign multiple roles to the existing user ID
80
Temperature and humidity controls
35. Which of the following is a reason why Mal - a security administrator - would implement port security?
Remote wipe
Social engineering
Server-side input validation results in a more secure system than client-side input validation.
To limit the number of endpoints connected through the same switch port
36. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Personal firewall
Personally owned devices
Port scanner
37. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
MAC filtering
Logic bomb
Antenna placement; Power-level control
GSM phone card and PIN
38. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
VLAN mismatch is occurring.
Code review
Full disk
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
39. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
Temperature and humidity controls
NAC
Application hardening
Mandatory access control
40. Which of the following are security relevant policies?
NTLM
Error handling
Non-repudiation
Information classification policy; Network access policy; Auditing and monitoring policy
41. Which of the following policies is implemented in order to minimize data loss or theft?
WPA2-PSK
PII handling
Remotely initiate a device wipe
Impersonation
42. Which of the following combinations represents multifactor authentication?
Clustering
Cipher lock combination and proximity badge
NAC
TPM
43. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?
Remotely initiate a device wipe
Software as a Service
Separation of duties
Separation of duties
44. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
IPS
Remote data wipe
Shoulder surfing
Validate the identity of an email sender;Encrypt messages;Decrypt messages
45. Which of the following BEST explains the security benefit of a standardized server image?
22
Change management
SSH
Mandated security configurations have been made to the operating system.
46. A company has sent all of its private keys to a third party. The third party company has created a secure list of these keys. Which of the following has just been implemented?
Risk avoidance
Key escrow
Humidity controls
Shoulder surfing
47. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Assign multiple roles to the existing user ID
Antenna placement; Power-level control
Input validation
Social engineering
48. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?
Change management
Integrity
Fraggle attack
Non-repudiation
49. Which of the following security chips does BitLocker utilize?
Something you are
Warm site
The DES algorithm is run three consecutive times against the item being encrypted.
TPM
50. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?
Zero day attack
Port scan
80
The DES algorithm is run three consecutive times against the item being encrypted.