SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following combinations represents multifactor authentication?
NIPS
Cipher lock combination and proximity badge
Impersonation
Account lockout
2. Which of the following are restricted to 64-bit block sizes?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Integrity
DES;3 DES
Failsafe
3. Which of the following is used to verify the identity of the sender of a signed email?
Public key
UDP 53
Mitigate risk and develop a maintenance plan.
SSH
4. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Cable locks
Account lockout
Confidentiality
5. Which of the following multifactor authentication methods uses biometrics?
dcfldd
Use Starbuck's private key to sign the binary
Something you are
SSH
6. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Power levels
Account lockout
RAS
Change management
7. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?
Mandatory access control
Server-side input validation results in a more secure system than client-side input validation.
RBAC
Compare hashes of the original source and system image.
8. Which of the following mitigates the risk of proprietary information being compromised?
Disable unused ports
Account expiration
File encryption
Time of day restrictions;Access control lists
9. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Rogue access point
Personally owned devices
Application hardening
Change management
10. Which of the following policies is implemented in order to minimize data loss or theft?
Rootkit
The capacity of a system to resist unauthorized changes to stored information
PII handling
Image hashes
11. Which of the following activities should be completed in order to detect anomalies on a network?
Log reviews
Single point of failure
Code review
Disable unused ports
12. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
23
Rogue access point
Fuzzing
Vishing
13. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?
14. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
NIPS
VLAN mismatch is occurring.
Cross-site scripting
The security company is provided with no information about the corporate network or physical locations.
15. Social networking sites are used daily by the marketing team for promotional purposes. However - confidential company information - including product pictures and potential partnerships - have been inadvertently exposed to the public by dozens of emp
23
Discretionary access control
Mandate additional security awareness training for all employees.
Integrity
16. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Fail state of the system
MD5
Loop protection
SSH
17. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Port forwarding
Humidity controls
Ticket granting server
Personal firewall
18. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
GSM phone card and PIN
Personally owned devices
Input validation
Mandate additional security awareness training for all employees.
19. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th
Private key
The system is virtualized
Proxy server
Gray box
20. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Dictionary; Brute force
Log reviews
Establish a MAC limit and age
Firewall
21. An SQL injection vulnerability can be caused by which of the following?
Account lockout
Full disk
Improper input validation
Gray box
22. Which of the following reduces the likelihood of a single point of failure when a server fails?
SSH
Information classification policy; Network access policy; Auditing and monitoring policy
Clustering
Mitigation
23. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
Update the CRL; Deploy OCSP
WPA2-Enterprise
Fuzzing
Mandate additional security awareness training for all employees.
24. Which of the following BEST describes a denial of service attack?
Memory dump - ARP cache
Mitigate risk and develop a maintenance plan.
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Zero day
25. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
SSH
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Signature based
Something you are - something you have
26. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
Clustering
WPA2-Enterprise
Information classification policy; Network access policy; Auditing and monitoring policy
Protocol analyzer
27. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?
Change management
22
Deploying and using a trusted OS
IV attack
28. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
Software as a Service
Warm site
Failsafe
Blue jacking
29. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?
Change management
Spam filter
Penetration testing
IPS
30. Which of the following allows a server to request a website on behalf of Starbuck - a user?
Clustering
Install application updates
Proxies
Validate the identity of an email sender;Encrypt messages;Decrypt messages
31. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
Impersonation
Mitigate risk and develop a maintenance plan.
SQL injection
Mandatory vacations
32. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi
WPA2-Enterprise
VLAN mismatch is occurring.
P2P
Account lockout
33. Which of the following is BEST utilized to actively test security controls on a particular system?
Penetration test
E-discovery
Device encryption
Vulnerability scan
34. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
War chalking
Fraggle attack
Failsafe
Mitigate risk and develop a maintenance plan.
35. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Vulnerability scan
Sanitization using appropriate software
Personally owned devices
RAS
36. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Use Starbuck's private key to sign the binary
Impersonation
Something you are - something you have
Impact; Likelihood
37. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
Memory dump - ARP cache
Update the CRL; Deploy OCSP
Fail state of the system
Shoulder surfing
38. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
WPA2-PSK
NTLM
Server-side input validation results in a more secure system than client-side input validation.
SNMPv3
39. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Key escrow
Device encryption
Dictionary; Brute force
Succession planning
40. The fundamental information security principals include confidentiality - availability and which of the following?
The capacity of a system to resist unauthorized changes to stored information
TACACS+
Verify the user's identity
Continuous monitoring
41. Which of the following should be done before resetting a user's password due to expiration?
42. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?
Port forwarding
Non-repudiation
Passive finger printing
Something you are
43. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
Power levels
Clustering
Zero day
Mitigate risk and develop a maintenance plan.
44. Which of the following does Starbuck - a software developer - need to do after compiling the source code of a program to attest the authorship of the binary?
45. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?
Mitigation
SQL injection
Fraggle attack
dcfldd
46. Which of the following password policies is the MOST effective against a brute force network attack?
23
Account lockout
Business impact assessment
AP power levels
47. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Update the CRL; Deploy OCSP
The security company is provided with no information about the corporate network or physical locations.
Succession planning
Protocol analyzers
48. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
It is faster to encrypt an individual file.
Account lockout
CA
Verify the user's identity
49. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?
Non-repudiation
Ticket granting server
Personally owned devices
Install both the private and the public key on the web server.
50. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
Software as a Service
PEAP
CA
Fuzzing