Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following reduces the likelihood of a single point of failure when a server fails?






2. A packet filtering firewall can protect from which of the following?






3. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






4. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






5. A valid server-role in a Kerberos authentication system






6. Which of the following control types is video monitoring?






7. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






8. Which of the following network devices will prevent port scans?






9. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






10. Which of the following is the purpose of the spanning tree protocol?






11. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






12. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






13. Which of the following is BEST associated with PKI?






14. Which of the following multifactor authentication methods uses biometrics?






15. Which of the following has a default port of 22?






16. Which of the following commands can Jayne - an administrator - use to create a forensically sound hard drive image?






17. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?






18. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






19. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






20. Which of the following is a feature of Kerberos?






21. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






22. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






23. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






24. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






25. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






26. Which of the following is a reason why Mal - a security administrator - would implement port security?






27. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






28. Which of the following technologies would allow the removal of a single point of failure?






29. Which of the following malware types is MOST commonly associated with command and control?






30. Which of the following are security relevant policies?






31. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






32. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






33. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






34. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






35. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






36. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?






37. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






38. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






39. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






40. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






41. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






42. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






43. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






44. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






45. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






46. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






47. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






48. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the






49. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






50. Which of the following practices reduces the attack surface of a wireless network?