Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?






2. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






3. Which of the following implements two factor authentication based on something you know and something you have?






4. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






5. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






6. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






7. 3DES is created when which of the following scenarios occurs?






8. Which of the following combinations represents multifactor authentication?






9. Which of the following are security relevant policies?






10. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?






11. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






12. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?






13. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






14. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






15. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






16. Which of the following multifactor authentication methods uses biometrics?






17. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






18. Which of the following technologies would allow the removal of a single point of failure?






19. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






20. Which of the following security controls enforces user permissions based on a job role?






21. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?






22. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






23. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






24. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






25. Which of the following BEST describes a denial of service attack?






26. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th






27. Which of the following BEST explains the security benefit of a standardized server image?






28. Which of the following is based on X.500 standards?






29. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






30. Which of the following mitigates the risk of proprietary information being compromised?






31. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






32. Which of the following is the purpose of the spanning tree protocol?






33. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?






34. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?






35. Which of the following elements makes up the standard equation used to define risk?






36. The public key is used to perform which of the following?






37. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






38. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?


39. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






40. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






41. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th






42. Which of the following is the BEST solution to securely administer remote servers?






43. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?






44. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






45. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






46. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






47. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






48. Which of the following is BEST utilized to actively test security controls on a particular system?






49. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






50. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?