SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the MAIN benefit of server-side versus client-side input validation?
It is faster to encrypt an individual file.
War chalking
Server-side input validation results in a more secure system than client-side input validation.
Key escrow
2. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Vulnerability scan
Zero day
RAID 5 and a storage area network
Memory dump - ARP cache
3. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Memory dump - ARP cache
Zero day
Key escrow
Anti-spam
4. Which of the following password policies is the MOST effective against a brute force network attack?
Account lockout
RADIUS
Loop protection
Proxies
5. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?
Code review
SSH
Change management
UDP 53
6. Which of the following is a best practice when securing a switch from physical access?
RAS
IPS
Disable unused ports
CRL
7. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Key escrow
Gray box
PEAP
Remote wipe
8. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
It is faster to encrypt an individual file.
Risk
21
Vishing
9. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Non-repudiation
WPA2-PSK
Port forwarding
TPM
10. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
PEAP
PEAP-MSCHAPv2
RADIUS
Fraggle attack
11. Which of the following is an improved version of the LANMAN hash?
NTLM
Spam filter
Mean time to restore
Detective
12. A company has sent all of its private keys to a third party. The third party company has created a secure list of these keys. Which of the following has just been implemented?
Cross-site scripting
Key escrow
SQL injection
Separation of duties
13. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
Warm site
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
LDAP
Application hardening
14. Which of the following reduces the likelihood of a single point of failure when a server fails?
Risk avoidance
DES;3 DES
Clustering
Warm site
15. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Establish a MAC limit and age
Loop protection
NIPS
LDAP
16. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Assign multiple roles to the existing user ID
Shoulder surfing
Server-side input validation results in a more secure system than client-side input validation.
Dictionary; Brute force
17. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
NIPS
Protocol analyzers
WPA2-PSK
80
18. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?
Subnetting
Continuous monitoring
Single point of failure
Proxy server
19. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
MD5
Ticket granting server
Shoulder surfing
Integrity
20. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
MAC filtering
IPS
NAC
Fuzzing
21. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
Deploy an anti-spam device to protect the network.
Application hardening
Integrity
PGP
22. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
MAC filtering
RADIUS
NAC
23. Which of the following security controls enforces user permissions based on a job role?
Group based privileges
Encrypt all confidential data.
Fail state of the system
Gray box
24. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Failsafe
Subnetting
Protocol analyzer
Temperature and humidity controls
25. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
80
Evil twin
Account expiration
RADIUS
26. Which of the following has a default port of 22?
WPA2-PSK
SSH
The system is virtualized
Change management
27. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
The DES algorithm is run three consecutive times against the item being encrypted.
SNMPv3
Clean desk policy
Spam fitters
28. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
22
SSH
Something you are - something you have
Code review
29. 3DES is created when which of the following scenarios occurs?
Detective
Botnets
The DES algorithm is run three consecutive times against the item being encrypted.
Establish a MAC limit and age
30. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
Mean time to restore
SSH
Clean desk policy
Fraggle attack
31. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?
RAID 5 and a storage area network
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Verify the user's identity
Anti-spam
32. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Change management
Cross-site scripting
P2P
Single point of failure
33. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
PEAP-MSCHAPv2
Single point of failure
Blowfish
Separation of duties
34. The public key is used to perform which of the following?
Vulnerability scan
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Single point of failure
Remote wipe
35. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Use Starbuck's private key to sign the binary
Anti-spam
Account lockout
IV attack
36. Which of the following security chips does BitLocker utilize?
Impersonation
ARP poisoning
Single sign-on
TPM
37. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Assign multiple roles to the existing user ID
Mandatory vacations
DES;3 DES
CA
38. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
To limit the number of endpoints connected through the same switch port
It is faster to encrypt an individual file.
Shoulder surfing
Antenna placement; Power levels
39. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
NTLM
Protocol analyzer
NIPS
File encryption
40. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
23
Succession planning
Account lockout
GSM phone card and PIN
41. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin
Install application updates
Encrypt all confidential data.
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Sanitization using appropriate software
42. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
To limit the number of endpoints connected through the same switch port
Compare hashes of the original source and system image.
Single point of failure
IPS
43. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Log reviews
Logic bomb
Input validation
VLAN mismatch is occurring.
44. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?
Mandate additional security awareness training for all employees.
Update the CRL; Deploy OCSP
Fuzzing
IV attack
45. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?
Mandatory access control
Vishing
Cable locks
TACACS+
46. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the
AP power levels
Compare hashes of the original source and system image.
Gray box
Cold site
47. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
Public key
Account lockout
Impersonation
Full disk
48. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?
Continuous monitoring
MD5 checksum
21
Discretionary access control
49. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
Firewall
Update the CRL; Deploy OCSP
Social engineering
SQL injection
50. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Encrypt all confidential data.
PGP
GSM phone card and PIN
Impact; Likelihood