Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following control types is video monitoring?






2. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






3. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?






4. Which of the following is the BEST solution to securely administer remote servers?






5. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






6. Which of the following is based on X.500 standards?






7. Which of the following are restricted to 64-bit block sizes?






8. Which of the following has a default port of 22?






9. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






10. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






11. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?






12. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?






13. Which of the following risks could IT management be mitigating by removing an all-in-one device?






14. An example of a false negative






15. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






16. Which of the following BEST describes a denial of service attack?






17. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






18. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?


19. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






20. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






21. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






22. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






23. A valid server-role in a Kerberos authentication system






24. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






25. Which of the following multifactor authentication methods uses biometrics?






26. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






27. Which of the following should be done before resetting a user's password due to expiration?


28. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






29. To mitigate the adverse effects of network modifications - which of the following should Jayne - the security administrator - implement?






30. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






31. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






32. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






33. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






34. Social networking sites are used daily by the marketing team for promotional purposes. However - confidential company information - including product pictures and potential partnerships - have been inadvertently exposed to the public by dozens of emp






35. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?






36. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






37. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






38. Which of the following security tools can Starbuck - a security administrator - use to deter theft?






39. Which of the following is a feature of Kerberos?






40. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






41. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






42. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?






43. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






44. The public key is used to perform which of the following?






45. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






46. 3DES is created when which of the following scenarios occurs?






47. Which of the following is the MAIN benefit of server-side versus client-side input validation?






48. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






49. Which of the following practices reduces the attack surface of a wireless network?






50. Which of the following policies is implemented in order to minimize data loss or theft?