Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


2. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






3. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






4. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






5. Which of the following are restricted to 64-bit block sizes?






6. Which of the following is used to verify the identity of the sender of a signed email?






7. Which of the following is a feature of Kerberos?






8. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






9. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






10. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






11. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?






12. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






13. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






14. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?






15. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






16. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?






17. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






18. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






19. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?






20. Which of the following security chips does BitLocker utilize?






21. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






22. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






23. Which of the following is BEST associated with PKI?






24. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?






25. A valid server-role in a Kerberos authentication system






26. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






27. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






28. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






29. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th






30. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






31. Which of the following policies is implemented in order to minimize data loss or theft?






32. Which of the following control types is video monitoring?






33. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






34. The public key is used to perform which of the following?






35. Which of the following practices reduces the attack surface of a wireless network?






36. Which of the following is the BEST solution to securely administer remote servers?






37. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






38. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






39. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






40. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






41. Which of the following activities should be completed in order to detect anomalies on a network?






42. Which of the following is the MOST important security requirement for mobile devices storing PII?






43. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






44. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?






45. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?






46. Which of the following BEST explains the security benefit of a standardized server image?






47. Which of the following reduces the likelihood of a single point of failure when a server fails?






48. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






49. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






50. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia