SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
Proxy server
Loop protection
SSH
IV attack
2. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?
IPS
Evil twin
Separation of duties
TPM
3. Which of the following mitigates the risk of proprietary information being compromised?
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
22
Botnets
File encryption
4. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Use Starbuck's private key to sign the binary
Social engineering
Protocol analyzer
5. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
Port scan
Vishing
Separation of duties
It is faster to encrypt an individual file.
6. Which of the following is an improved version of the LANMAN hash?
MD5
Subnetting
NTLM
Assign multiple roles to the existing user ID
7. Which of the following is the MOST important security requirement for mobile devices storing PII?
Time of day restrictions;Access control lists
Penetration test
Port scanner
Remote data wipe
8. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
SSH
Spam filter
Deploying and using a trusted OS
9. Which of the following is used to verify the identity of the sender of a signed email?
Public key
dcfldd
SSH
The IDS does not identify a buffer overflow
10. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
IV attack
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Cross-site scripting
Personally owned devices
11. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
Separation of duties
Sanitization using appropriate software
Power levels
Risk avoidance
12. The fundamental information security principals include confidentiality - availability and which of the following?
Remote data wipe
WPA2-Enterprise
Firewall
The capacity of a system to resist unauthorized changes to stored information
13. Which of the following activities should be completed in order to detect anomalies on a network?
Disable unused ports
Memory dump - ARP cache
Log reviews
Anti-spam
14. Which of the following policies is implemented in order to minimize data loss or theft?
Remotely initiate a device wipe
TACACS+
Information classification policy; Network access policy; Auditing and monitoring policy
PII handling
15. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
Risk avoidance
Blowfish
Image hashes
Temperature and humidity controls
16. Which of the following accurately describes the STRONGEST multifactor authentication?
Fail state of the system
Cross-site scripting
Something you are - something you have
Vulnerability scan
17. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?
Continuous monitoring
Image hashes
Worm outbreak
Mitigate risk and develop a maintenance plan.
18. Which of the following multifactor authentication methods uses biometrics?
Succession planning
Loop protection
Something you are
The intermediate CA's public key
19. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Remote wipe
Update the CRL; Deploy OCSP
Error handling
Discretionary access control
21. Jayne - a system administrator - wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?
Host based firewall
TACACS+; SSH
Proxies
RAID 5 and a storage area network
22. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
WPA2-PSK
Humidity controls
GSM phone card and PIN
Fraggle attack
23. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
PEAP-MSCHAPv2
Remotely initiate a device wipe
Port forwarding
Device encryption
24. Which of the following is a best practice when securing a switch from physical access?
21
SQL injection
RAS
Disable unused ports
25. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
Firewall
80
LDAP
22
26. A valid server-role in a Kerberos authentication system
Ticket granting server
NIPS
Clean desk policy
TACACS+
27. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
MAC filtering
Two fish
Integrity
Personally owned devices
28. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Full disk encryption
21
SNMPv3
29. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from
Zero day attack
Evil twin
Error handling
Group based privileges
30. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
Remotely initiate a device wipe
Mandatory vacations
Mandate additional security awareness training for all employees.
ARP poisoning
31. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Protocol analyzers
RAS
Spam fitters
32. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
AP power levels
Notify security to identify employee's whereabouts.
E-discovery
Blue jacking
33. Which of the following implements two factor authentication based on something you know and something you have?
Account lockout
Anti-spam
Zero day
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
34. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Gray box
Update the CRL; Deploy OCSP
UDP 53
Assign multiple roles to the existing user ID
35. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Worm outbreak
Notify security to identify employee's whereabouts.
Blue jacking
Key escrow
36. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Risk avoidance
Zero day exploit
Loop protection
Antenna placement; Power levels
37. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
IV attack
IPS
NIPS
Single point of failure
38. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the
Application hardening
Time of day restrictions;Access control lists
Update the CRL; Deploy OCSP
Port scan
39. Which of the following is the purpose of the spanning tree protocol?
SSH
File encryption
Detective
Loop protection
40. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?
NIPS
MD5 checksum
RBAC
The security company is provided with no information about the corporate network or physical locations.
41. Which of the following is BEST associated with PKI?
P2P
Private key
Impersonation
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
42. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Shoulder surfing
Impact; Likelihood
Account lockout
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
43. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
SSH
Shoulder surfing
Memory dump - ARP cache
Protocol analyzer
44. Which of the following has a default port of 22?
Ticket granting server
Vishing
SSH
Antenna placement; Power-level control
45. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Shoulder surfing
Zero day
Install both the private and the public key on the web server.
IV attack
46. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
Spam filter
To limit the number of endpoints connected through the same switch port
TPM
Remote wipe
47. The public key is used to perform which of the following?
Validate the identity of an email sender;Encrypt messages;Decrypt messages
PGP
Impersonation
Loop protection
48. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
SSH
Protocol analyzer
Memory dump - ARP cache
Evil twin
49. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?
Business impact assessment
Host based firewall
MAC filtering
AP power levels
50. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Loop protection
Spam fitters
NIPS
Device encryption
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests