Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






2. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






3. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






4. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






5. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






6. Which of the following password policies is the MOST effective against a brute force network attack?






7. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?






8. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






9. Which of the following is BEST associated with PKI?






10. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






11. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






12. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






13. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






14. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






15. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






16. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






17. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






18. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?






19. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






20. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?






21. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?






22. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






23. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






24. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?






25. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?






26. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






27. Which of the following implements two factor authentication based on something you know and something you have?






28. Which of the following malware types is MOST commonly associated with command and control?






29. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






30. Which of the following is a best practice when securing a switch from physical access?






31. Which of the following BEST describes a denial of service attack?






32. The fundamental information security principals include confidentiality - availability and which of the following?






33. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






34. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






35. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?






36. Which of the following is an improved version of the LANMAN hash?






37. Which of the following practices reduces the attack surface of a wireless network?






38. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?






39. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






40. Which of the following network devices will prevent port scans?






41. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






42. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






43. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






44. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






46. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






47. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?






48. An example of a false negative






49. Which of the following is the MOST important security requirement for mobile devices storing PII?






50. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests