SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Confidentiality
Humidity controls
2. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?
Remotely initiate a device wipe
Group based privileges
Dual-homing a server
Fuzzing
3. Social networking sites are used daily by the marketing team for promotional purposes. However - confidential company information - including product pictures and potential partnerships - have been inadvertently exposed to the public by dozens of emp
Port scan
Subnetting
Rootkit
Mandate additional security awareness training for all employees.
4. Which of the following mitigates the risk of proprietary information being compromised?
File encryption
Account expiration
Log reviews
SSH
5. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Group based privileges
Social engineering
Clean desk policy
Single point of failure
6. Which of the following authentication protocols forces centralized wireless authentication?
Mitigation
VLAN mismatch is occurring.
Port forwarding
WPA2-Enterprise
7. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?
Evil twin
Mean time to restore
Cipher lock combination and proximity badge
RAS
8. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
21
Port forwarding
dcfldd
Remote wipe
9. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Sanitization using appropriate software
Mitigation
10. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
Impersonation
File encryption
Single point of failure
VLAN mismatch is occurring.
11. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Cross-site scripting
The security company is provided with no information about the corporate network or physical locations.
Log reviews
Key escrow
12. Which of the following is the BEST solution to securely administer remote servers?
SSH
Succession planning
Something you are - something you have
Ticket granting server
13. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Humidity controls
Private key
Temperature and humidity controls
14. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
Fuzzing
Cable locks
Group based privileges
Mandatory access control
15. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
Botnets
It is faster to encrypt an individual file.
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
The security company is provided with no information about the corporate network or physical locations.
16. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Application hardening
RAID 5 and a storage area network
RADIUS
SSH
17. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Penetration test
Firewall
23
NAC
18. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
War chalking
Vishing
Cipher lock combination and proximity badge
Mean time to restore
19. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Cable locks
Spam fitters
DES;3 DES
Memory dump - ARP cache
20. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
Blowfish
SSH
Install both the private and the public key on the web server.
Social engineering
21. Which of the following implements two factor authentication based on something you know and something you have?
Information classification policy; Network access policy; Auditing and monitoring policy
Confidentiality
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Use Starbuck's private key to sign the binary
22. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Establish a MAC limit and age
Public key
Clean desk policy
23. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
AP power levels
CRL
Impersonation
Shoulder surfing
24. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
Loop protection
Encrypt all confidential data.
Impact; Likelihood
25. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Account lockout
AP power levels
Loop protection
Cross-site scripting
26. Which of the following is used to verify the identity of the sender of a signed email?
Mandatory access control
SSH
Succession planning
Public key
27. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
Ask the programmer to replicate the problem in a test environment.
80
Update the CRL; Deploy OCSP
Mandatory vacations
28. Which of the following BEST explains the security benefit of a standardized server image?
Sanitization using appropriate software
Mandated security configurations have been made to the operating system.
SQL injection
Change management
29. Hashing algorithms are used to address which of the following?
Integrity
22
Group based privileges
80
30. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
VLAN mismatch is occurring.
TACACS+; SSH
Two fish
Temperature and humidity controls
31. Which of the following network devices will prevent port scans?
Device encryption
Trust model
23
Firewall
32. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?
Zero day
WPA2-Enterprise
SSH
Passive finger printing
33. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Mandatory access control
Succession planning
Zero day exploit
Confidentiality
34. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Mitigate risk and develop a maintenance plan.
Input validation
MD5 checksum
Deploying and using a trusted OS
35. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
Ticket granting server
Vulnerability scan
Install both the private and the public key on the web server.
Single point of failure
36. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
Non-repudiation
Impersonation
Personally owned devices
SSH
37. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
NAC
SNMPv3
RBAC
22
38. Which of the following does Starbuck - a software developer - need to do after compiling the source code of a program to attest the authorship of the binary?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
CRL
Proxies
PII handling
NIPS
40. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
Time of day restrictions;Access control lists
Deploy an anti-spam device to protect the network.
VLAN mismatch is occurring.
Antenna placement; Power-level control
41. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
Risk
Mandatory access control
Proxies
dcfldd
42. Which of the following BEST describes a denial of service attack?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Fail state of the system
Risk avoidance
Group based privileges
43. Which of the following risks could IT management be mitigating by removing an all-in-one device?
Single point of failure
Remotely initiate a device wipe
Firewall
P2P
44. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
Public key
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
IPS
Personally owned devices
45. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
Image hashes
Single point of failure
Detective
Application hardening
46. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
Public key
Fraggle attack
Host based firewall
Temperature and humidity controls
47. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Loop protection
Protocol analyzers
The security company is provided with no information about the corporate network or physical locations.
Subnetting
48. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Business impact assessment
23
Personally owned devices
Discretionary access control
49. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS
Anti-spam
The security company is provided with no information about the corporate network or physical locations.
PEAP-MSCHAPv2
Separation of duties
50. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
Impact; Likelihood
ARP poisoning
Risk
Notify security to identify employee's whereabouts.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests