Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






2. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






3. Which of the following mitigates the risk of proprietary information being compromised?






4. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






5. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






6. Which of the following is an improved version of the LANMAN hash?






7. Which of the following is the MOST important security requirement for mobile devices storing PII?






8. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






9. Which of the following is used to verify the identity of the sender of a signed email?






10. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?






11. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






12. The fundamental information security principals include confidentiality - availability and which of the following?






13. Which of the following activities should be completed in order to detect anomalies on a network?






14. Which of the following policies is implemented in order to minimize data loss or theft?






15. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?






16. Which of the following accurately describes the STRONGEST multifactor authentication?






17. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?






18. Which of the following multifactor authentication methods uses biometrics?






19. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






21. Jayne - a system administrator - wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?






22. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






23. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






24. Which of the following is a best practice when securing a switch from physical access?






25. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






26. A valid server-role in a Kerberos authentication system






27. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






28. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?






29. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






30. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?






31. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...






32. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






33. Which of the following implements two factor authentication based on something you know and something you have?






34. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut






35. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






36. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






37. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






38. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the






39. Which of the following is the purpose of the spanning tree protocol?






40. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






41. Which of the following is BEST associated with PKI?






42. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






43. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






44. Which of the following has a default port of 22?






45. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






46. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?






47. The public key is used to perform which of the following?






48. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






49. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?






50. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests