SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
Blowfish
IV attack
Install both the private and the public key on the web server.
23
2. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
PGP
Cross-site scripting
VLAN mismatch is occurring.
Separation of duties
3. Which of the following security controls enforces user permissions based on a job role?
Install application updates
Personally owned devices
CA
Group based privileges
4. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
The IDS does not identify a buffer overflow
Power levels
Social engineering
Input validation
5. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Spam fitters
Signature based
NIPS
The system is virtualized
6. Which of the following is a best practice when securing a switch from physical access?
PEAP-MSCHAPv2
Disable unused ports
Mandatory Access Controls
22
7. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Mandatory Access Controls
Memory dump - ARP cache
PGP
Fail state of the system
8. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Signature based
Use Starbuck's private key to sign the binary
Loop protection
Memory dump - ARP cache
9. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Social engineering
Change management
Mandatory access control
Protocol analyzers
10. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Separation of duties
Separation of duties
Clean desk policy
Image hashes
12. Which of the following accurately describes the STRONGEST multifactor authentication?
Detective
Something you are - something you have
PGP
NIPS
13. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
TACACS+
Port scanner
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Separation of duties
14. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
Dual-homing a server
War chalking
RBAC
Port scan
15. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Non-repudiation
MD5
PEAP-MSCHAPv2
SQL injection
16. Which of the following ports should be open in order for River Tam and Mal - users - to identify websites by domain name?
IPS
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
UDP 53
Shoulder surfing
17. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?
Zero day exploit
Separation of duties
RAID 5 and a storage area network
Port forwarding
18. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
Penetration test
RAS
SQL injection
Spam fitters
19. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Antenna placement; Power levels
Change management
Key escrow
Failsafe
20. Hashing algorithms are used to address which of the following?
Vishing
Mandate additional security awareness training for all employees.
Integrity
Notify security to identify employee's whereabouts.
21. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
Two fish
IPS
Update the CRL; Deploy OCSP
Group based privileges
22. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS
LDAP
PEAP-MSCHAPv2
Temperature and humidity controls
Two fish
23. Which of the following password policies is the MOST effective against a brute force network attack?
Assign multiple roles to the existing user ID
Deploy an anti-spam device to protect the network.
Integrity
Account lockout
24. Which of the following is a feature of Kerberos?
Single sign-on
Mandatory Access Controls
Vulnerability scan
Failsafe
25. The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?
Information classification policy; Network access policy; Auditing and monitoring policy
Botnets
Signature based
DES;3 DES
26. Which of the following combinations represents multifactor authentication?
Gray box
Clustering
Worm outbreak
Cipher lock combination and proximity badge
27. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Use Starbuck's private key to sign the binary
Loop protection
Impersonation
Logic bomb
28. Which of the following is BEST utilized to actively test security controls on a particular system?
Deploying and using a trusted OS
Port scanner
Penetration test
Fuzzing
29. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
Remote wipe
NIPS
File encryption
Risk
30. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
NTLM
Host based firewall
Port forwarding
Rootkit
31. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?
Zero day attack
CRL
ARP poisoning
Code review
32. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
Spam filter
Succession planning
Cross-site scripting
Non-repudiation
33. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Humidity controls
Proxy server
Improper input validation
Mandate additional security awareness training for all employees.
35. Which of the following is the purpose of the spanning tree protocol?
Mean time to restore
Separation of duties
Loop protection
CRL
36. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
Separation of duties
NIPS
Shoulder surfing
It is faster to encrypt an individual file.
37. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
Fuzzing
Mitigation
SNMPv3
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
39. Which of the following mitigates the risk of proprietary information being compromised?
War chalking
IPS
Zero day exploit
File encryption
40. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
Port scanner
Spam fitters
Mandatory access control
Compare hashes of the original source and system image.
41. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
Mandatory vacations
Temperature and humidity controls
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
TACACS+; SSH
42. Which of the following is the BEST solution to securely administer remote servers?
SSH
Single point of failure
Risk avoidance
Key escrow
43. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee
Mandatory vacations
To limit the number of endpoints connected through the same switch port
WPA2-PSK
Business impact assessment
44. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
GSM phone card and PIN
PEAP
Blue jacking
Private key
45. Which of the following elements makes up the standard equation used to define risk?
Install application updates
Impact; Likelihood
Sanitization using appropriate software
Clean desk policy
46. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?
Separation of duties
MD5 checksum
Software as a Service
Mandatory access control
47. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?
ARP poisoning
Passive finger printing
Zero day
Social engineering
48. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
WPA2-PSK
PEAP-MSCHAPv2
Deploying and using a trusted OS
Account lockout
49. Which of the following activities should be completed in order to detect anomalies on a network?
Mandated security configurations have been made to the operating system.
Anti-spam
Log reviews
Sanitization using appropriate software
50. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
Ask the programmer to replicate the problem in a test environment.
TACACS+
VLAN mismatch is occurring.
Establish a MAC limit and age