SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Port forwarding
Antenna placement; Power levels
Separation of duties
Subnetting
2. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?
The DES algorithm is run three consecutive times against the item being encrypted.
Key escrow
Rootkit
Continuous monitoring
3. Which of the following is the purpose of the spanning tree protocol?
Mandatory Access Controls
TACACS+
Loop protection
The DES algorithm is run three consecutive times against the item being encrypted.
4. Which of the following should River Tam - a security technician - perform as the FIRST step when creating a disaster recovery plan for a mission critical accounting system?
TACACS+; SSH
E-discovery
Deploying and using a trusted OS
Business impact assessment
5. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?
TPM
IV attack
Non-repudiation
The capacity of a system to resist unauthorized changes to stored information
6. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?
Personally owned devices
TACACS+
Mandatory Access Controls
Application hardening
7. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?
22
Firewall
E-discovery
PII handling
8. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?
Anti-spam
Host based firewall
ARP poisoning
Sanitization using appropriate software
9. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Key escrow
Impersonation
Port forwarding
Mandatory Access Controls
10. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?
Blue jacking
Improper input validation
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Zero day attack
11. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Port scanner
RADIUS
VLAN mismatch is occurring.
Change management
12. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
The DES algorithm is run three consecutive times against the item being encrypted.
Succession planning
Disable unused ports
NIPS
13. Which of the following activities should be completed in order to detect anomalies on a network?
Log reviews
22
Humidity controls
Failsafe
14. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Error handling
The IDS does not identify a buffer overflow
RADIUS
Full disk
15. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Logic bomb
Port forwarding
Risk
16. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
LDAP
Zero day exploit
Separation of duties
SSH
17. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
23
Social engineering
Ask the programmer to replicate the problem in a test environment.
Mean time to restore
18. Which of the following are restricted to 64-bit block sizes?
Humidity controls
DES;3 DES
Mandate additional security awareness training for all employees.
Device encryption
19. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
Establish a MAC limit and age
Input validation
Shoulder surfing
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
20. Which of the following is a feature of Kerberos?
Single sign-on
Proxies
Deploying and using a trusted OS
Ask the programmer to replicate the problem in a test environment.
21. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Impact; Likelihood
WPA2-Enterprise
E-discovery
Social engineering
22. Which of the following malware types is MOST commonly associated with command and control?
Warm site
Botnets
Ask the programmer to replicate the problem in a test environment.
22
23. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks
TACACS+
Input validation
Spam filter
Disable unused ports
24. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Notify security to identify employee's whereabouts.
MAC filtering
SNMPv3
25. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?
The IDS does not identify a buffer overflow
SSH
RBAC
Dual-homing a server
26. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
Deploy an anti-spam device to protect the network.
Worm outbreak
Deploying and using a trusted OS
The DES algorithm is run three consecutive times against the item being encrypted.
27. Which of the following is the MOST important security requirement for mobile devices storing PII?
Trust model
Spam filter
Non-repudiation
Remote data wipe
28. Which of the following combinations represents multifactor authentication?
The intermediate CA's public key
Proxies
Separation of duties
Cipher lock combination and proximity badge
29. Which of the following allows a server to request a website on behalf of Starbuck - a user?
Sanitization using appropriate software
Proxies
Vulnerability scan
Worm outbreak
30. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
Fuzzing
Information classification policy; Network access policy; Auditing and monitoring policy
Port scan
SSH
31. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
TACACS+; SSH
Separation of duties
The intermediate CA's public key
Mean time to restore
32. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
File encryption
Warm site
Fail state of the system
dcfldd
33. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Assign multiple roles to the existing user ID
Disable unused ports
Botnets
Anti-spam
34. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Zero day
Change management
Dictionary; Brute force
Deploying and using a trusted OS
35. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
The security company is provided with no information about the corporate network or physical locations.
Public key
Loop protection
Integrity
36. Which of the following security chips does BitLocker utilize?
TPM
Private key
SSH
Subnetting
37. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
Clustering
It is faster to encrypt an individual file.
MD5 checksum
MAC filtering
38. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Validate the identity of an email sender;Encrypt messages;Decrypt messages
NTLM
Deploying and using a trusted OS
Deploy an anti-spam device to protect the network.
39. A valid server-role in a Kerberos authentication system
MAC filtering
Detective
Mandatory access control
Ticket granting server
40. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Loop protection
Clean desk policy
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Protocol analyzers
41. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
TACACS+
Zero day
VLAN mismatch is occurring.
Fraggle attack
42. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
Rogue access point
Vulnerability scan
Compare hashes of the original source and system image.
Deploying and using a trusted OS
43. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Dictionary; Brute force
Cross-site scripting
Logic bomb
Spam fitters
44. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Which of the following practices reduces the attack surface of a wireless network?
Antenna placement; Power-level control
Vulnerability scan
File encryption
SSH
46. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Proxy server
VLAN mismatch is occurring.
Install both the private and the public key on the web server.
Warm site
47. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
War chalking
Mandatory access control
dcfldd
NIPS
48. Which of the following security controls enforces user permissions based on a job role?
SSH
Mandatory Access Controls
Fuzzing
Group based privileges
49. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Firewall
Separation of duties
CA
50. A packet filtering firewall can protect from which of the following?
LDAP
Port forwarding
Deploy an anti-spam device to protect the network.
Port scan