Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The fundamental information security principals include confidentiality - availability and which of the following?






2. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






3. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






4. Which of the following control types is video monitoring?






5. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






6. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






7. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






8. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






9. Which of the following is where an unauthorized device is found allowing access to a network?






10. Which of the following is the purpose of the spanning tree protocol?






11. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?






12. Which of the following should River Tam - a security technician - perform as the FIRST step when creating a disaster recovery plan for a mission critical accounting system?






13. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






14. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






15. The Chief Information Officer (CIO) wants to protect laptop users from zero day attacks. Which of the following would BEST achieve the CIO's goal?






16. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...






17. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






18. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






19. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow






20. Which of the following is based on X.500 standards?






21. Which of the following authentication protocols forces centralized wireless authentication?






22. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






23. Which of the following allows a server to request a website on behalf of Starbuck - a user?






24. Which of the following implements two factor authentication based on something you know and something you have?






25. Which of the following accurately describes the STRONGEST multifactor authentication?






26. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?


27. Which of the following malware types is MOST commonly associated with command and control?






28. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






29. Which of the following activities should be completed in order to detect anomalies on a network?






30. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






31. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






32. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






33. Which of the following BEST describes a denial of service attack?






34. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...






35. A company has sent all of its private keys to a third party. The third party company has created a secure list of these keys. Which of the following has just been implemented?






36. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?






37. Which of the following is a reason why Mal - a security administrator - would implement port security?






38. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






39. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?






40. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






41. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






42. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






43. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






44. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






45. Which of the following is BEST associated with PKI?






46. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






47. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






48. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






49. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






50. Which of the following is the BEST solution to securely administer remote servers?