Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the MAIN benefit of server-side versus client-side input validation?






2. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






3. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






4. Which of the following password policies is the MOST effective against a brute force network attack?






5. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






6. Which of the following is a best practice when securing a switch from physical access?






7. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






8. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






9. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






10. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?






11. Which of the following is an improved version of the LANMAN hash?






12. A company has sent all of its private keys to a third party. The third party company has created a secure list of these keys. Which of the following has just been implemented?






13. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






14. Which of the following reduces the likelihood of a single point of failure when a server fails?






15. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






16. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






17. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






18. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?






19. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






20. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






21. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?






22. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






23. Which of the following security controls enforces user permissions based on a job role?






24. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






25. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?






26. Which of the following has a default port of 22?






27. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






28. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






29. 3DES is created when which of the following scenarios occurs?






30. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






31. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






32. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






33. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






34. The public key is used to perform which of the following?






35. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






36. Which of the following security chips does BitLocker utilize?






37. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






38. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






39. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






40. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






41. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






42. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






43. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?






44. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?






45. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






46. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






47. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






48. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






49. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






50. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?