Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






2. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






3. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS






4. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






5. Which of the following is the purpose of the spanning tree protocol?






6. The public key is used to perform which of the following?






7. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






8. Which of the following encrypts the body of a packet - rather than just the password - while sending information?






9. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






10. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...






11. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






12. Which of the following has a default port of 22?






13. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






14. 3DES is created when which of the following scenarios occurs?






15. Which of the following is BEST utilized to actively test security controls on a particular system?






16. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






17. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






18. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






19. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






20. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






21. Which of the following malware types is MOST commonly associated with command and control?






22. Which of the following is BEST associated with PKI?






23. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






24. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






25. Which of the following accurately describes the STRONGEST multifactor authentication?






26. Which of the following are security relevant policies?






27. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






28. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






29. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?






30. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






32. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






33. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






34. Which of the following technologies would allow the removal of a single point of failure?






35. Which of the following is used to verify the identity of the sender of a signed email?






36. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?






37. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






38. Which of the following security controls enforces user permissions based on a job role?






39. Which of the following multifactor authentication methods uses biometrics?






40. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






41. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






42. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






43. The fundamental information security principals include confidentiality - availability and which of the following?






44. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






45. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






46. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






47. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






48. Which of the following risks could IT management be mitigating by removing an all-in-one device?






49. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






50. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests