SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
Cable locks
Improper input validation
Mandatory vacations
Log reviews
2. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
Change management
Mitigate risk and develop a maintenance plan.
Trust model
MD5 checksum
3. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?
Business impact assessment
Private key
Evil twin
Port scan
4. Which of the following is an improved version of the LANMAN hash?
Risk
SQL injection
NTLM
Detective
5. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
SSH
Spam fitters
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
The IDS does not identify a buffer overflow
6. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
SSH
Private key
Impersonation
Rogue access point
7. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
The security company is provided with no information about the corporate network or physical locations.
Failsafe
IV attack
The system is virtualized
8. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
The intermediate CA's public key
LDAP
Fuzzing
Loop protection
9. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
The IDS does not identify a buffer overflow
Verify the user's identity
Protocol analyzer
Confidentiality
10. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Change management
MD5
The IDS does not identify a buffer overflow
Server-side input validation results in a more secure system than client-side input validation.
11. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi
RAID 5 and a storage area network
Two fish
Server-side input validation results in a more secure system than client-side input validation.
P2P
12. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
The capacity of a system to resist unauthorized changes to stored information
Install both the private and the public key on the web server.
NIPS
E-discovery
13. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Two fish
NIPS
Device encryption
Port forwarding
14. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
Impersonation
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Rootkit
The system is virtualized
15. Which of the following BEST explains the security benefit of a standardized server image?
Mitigate risk and develop a maintenance plan.
80
Proxy server
Mandated security configurations have been made to the operating system.
16. Which of the following policies is implemented in order to minimize data loss or theft?
Loop protection
PII handling
LDAP
Trust model
17. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Improper input validation
ARP poisoning
MD5 checksum
18. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Code review
Social engineering
TACACS+
AP power levels
19. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...
Something you are
Impersonation
Cross-site scripting
Separation of duties
20. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Failsafe
Zero day attack
Full disk
Continuous monitoring
21. Jayne - a system administrator - wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?
dcfldd
Vulnerability scan
RAID 5 and a storage area network
Discretionary access control
22. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Deploy an anti-spam device to protect the network.
NIPS
Ask the programmer to replicate the problem in a test environment.
Sanitization using appropriate software
23. Which of the following is where an unauthorized device is found allowing access to a network?
Clustering
Update the CRL; Deploy OCSP
Rogue access point
Trust model
24. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Logic bomb
Risk avoidance
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
To limit the number of endpoints connected through the same switch port
25. Which of the following malware types is MOST commonly associated with command and control?
Proxy server
Key escrow
Rootkit
Botnets
26. Which of the following elements makes up the standard equation used to define risk?
Two fish
Error handling
Impact; Likelihood
Memory dump - ARP cache
27. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?
Time of day restrictions;Access control lists
Mandatory Access Controls
Mitigate risk and develop a maintenance plan.
CA
29. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
Fuzzing
Compare hashes of the original source and system image.
Image hashes
NTLM
30. Which of the following security tools can Starbuck - a security administrator - use to deter theft?
Two fish
Port scanner
23
Cable locks
31. Which of the following activities should be completed in order to detect anomalies on a network?
Shoulder surfing
Fuzzing
Log reviews
Code review
32. Which of the following are restricted to 64-bit block sizes?
DES;3 DES
Antenna placement; Power-level control
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Warm site
33. Which of the following risks could IT management be mitigating by removing an all-in-one device?
Evil twin
Single point of failure
Change management
Protocol analyzer
34. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
Blowfish
PEAP-MSCHAPv2
AP power levels
Install both the private and the public key on the web server.
35. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
Loop protection
Confidentiality
GSM phone card and PIN
The intermediate CA's public key
36. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Mandated security configurations have been made to the operating system.
Assign multiple roles to the existing user ID
It is faster to encrypt an individual file.
Succession planning
37. Which of the following practices reduces the attack surface of a wireless network?
Antenna placement; Power-level control
Impersonation
Account expiration
PEAP-MSCHAPv2
38. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
Social engineering
Server-side input validation results in a more secure system than client-side input validation.
PEAP
Cipher lock combination and proximity badge
39. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Zero day
Full disk
Personally owned devices
E-discovery
40. Which of the following security chips does BitLocker utilize?
Personal firewall
Port forwarding
dcfldd
TPM
41. The fundamental information security principals include confidentiality - availability and which of the following?
MAC filtering
ARP poisoning
Mandatory vacations
The capacity of a system to resist unauthorized changes to stored information
42. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?
Risk avoidance
Gray box
The DES algorithm is run three consecutive times against the item being encrypted.
Spam filter
43. 3DES is created when which of the following scenarios occurs?
Full disk
The DES algorithm is run three consecutive times against the item being encrypted.
Fuzzing
80
44. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
23
Antenna placement; Power levels
Device encryption
Mandate additional security awareness training for all employees.
45. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Group based privileges
Code review
Cable locks
Spam fitters
46. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?
Port scanner
Update the CRL; Deploy OCSP
Mandatory vacations
Continuous monitoring
47. Which of the following network devices will prevent port scans?
PEAP-MSCHAPv2
Personal firewall
Fuzzing
Firewall
48. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Humidity controls
Memory dump - ARP cache
Key escrow
Blowfish
49. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Port forwarding
E-discovery
Change management
Key escrow
50. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
Port scanner
IPS
IV attack
Input validation