SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?
Continuous monitoring
Software as a Service
SSH
Spam filter
2. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?
Key escrow
The DES algorithm is run three consecutive times against the item being encrypted.
Remotely initiate a device wipe
Verify the user's identity
4. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
Code review
Remotely initiate a device wipe
Proxy server
Cold site
5. Which of the following is based on X.500 standards?
Account lockout
Separation of duties
LDAP
It is faster to encrypt an individual file.
6. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?
The DES algorithm is run three consecutive times against the item being encrypted.
Port forwarding
Port scanner
Single point of failure
7. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
Single point of failure
21
File encryption
IPS
8. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Rogue access point
Full disk encryption
dcfldd
Impersonation
9. Which of the following is a feature of Kerberos?
23
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Proxies
Single sign-on
10. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
It is faster to encrypt an individual file.
Clean desk policy
Deploy an anti-spam device to protect the network.
Protocol analyzer
11. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
Temperature and humidity controls
Log reviews
Protocol analyzer
Cross-site scripting
12. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
SSH
Install application updates
File encryption
Account lockout
13. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Change management
MD5 checksum
SSH
NTLM
14. A packet filtering firewall can protect from which of the following?
PEAP
Port scan
Passive finger printing
Mandate additional security awareness training for all employees.
15. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?
Verify the user's identity
Separation of duties
TACACS+; SSH
Update the CRL; Deploy OCSP
16. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
IPS
Cold site
Detective
Account lockout
17. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
Vishing
Key escrow
NIPS
Proxies
18. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?
IV attack
Deploying and using a trusted OS
Antenna placement; Power levels
The intermediate CA's public key
19. Which of the following technologies would allow the removal of a single point of failure?
Business impact assessment
Mandated security configurations have been made to the operating system.
GSM phone card and PIN
Dual-homing a server
20. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Ticket granting server
Social engineering
RBAC
Humidity controls
21. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
PII handling
File encryption
MD5 checksum
RAID 5 and a storage area network
22. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Host based firewall
Single sign-on
Deploying and using a trusted OS
NIPS
23. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?
Continuous monitoring
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
TACACS+
Non-repudiation
24. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS
Memory dump - ARP cache
PEAP-MSCHAPv2
MD5 checksum
Mandatory vacations
25. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Dictionary; Brute force
Remotely initiate a device wipe
Host based firewall
CA
26. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
Port scanner
Code review
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Public key
27. Which of the following network devices will prevent port scans?
SSH
Impact; Likelihood
Key escrow
Firewall
28. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
Spam fitters
The security company is provided with no information about the corporate network or physical locations.
E-discovery
The DES algorithm is run three consecutive times against the item being encrypted.
29. Which of the following is where an unauthorized device is found allowing access to a network?
Separation of duties
Code review
Rogue access point
GSM phone card and PIN
30. Which of the following combinations represents multifactor authentication?
Code review
Cipher lock combination and proximity badge
Assign multiple roles to the existing user ID
Impersonation
31. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
Penetration testing
Cross-site scripting
Subnetting
Software as a Service
32. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Establish a MAC limit and age
Cable locks
Subnetting
UDP 53
33. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does
Mandatory access control
Group based privileges
Install both the private and the public key on the web server.
Passive finger printing
34. Which of the following accurately describes the STRONGEST multifactor authentication?
Something you are - something you have
Temperature and humidity controls
Non-repudiation
RBAC
35. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...
Encrypt all confidential data.
RADIUS
Personal firewall
Social engineering
36. Which of the following BEST explains the security benefit of a standardized server image?
IPS
Mandatory vacations
Mandated security configurations have been made to the operating system.
Remotely initiate a device wipe
37. Which of the following implements two factor authentication based on something you know and something you have?
PII handling
Confidentiality
Personally owned devices
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
38. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
WPA2-PSK
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Firewall
SNMPv3
39. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Key escrow
MD5
Blue jacking
Mandatory access control
40. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Penetration testing
Mean time to restore
Blue jacking
Compare hashes of the original source and system image.
41. Which of the following mitigates the risk of proprietary information being compromised?
Device encryption
File encryption
IPS
UDP 53
42. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Vulnerability scan
Device encryption
Key escrow
Compare hashes of the original source and system image.
43. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
AP power levels
Mandatory vacations
Image hashes
The system is virtualized
44. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Protocol analyzer
Rogue access point
The capacity of a system to resist unauthorized changes to stored information
RADIUS
45. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Zero day
Rogue access point
Personal firewall
Establish a MAC limit and age
46. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
SSH
Encrypt all confidential data.
Port scanner
Warm site
47. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
Firewall
Image hashes
VLAN mismatch is occurring.
Ask the programmer to replicate the problem in a test environment.
48. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?
CRL
SSH
Separation of duties
Mandatory access control
49. Which of the following is the MOST important security requirement for mobile devices storing PII?
Zero day exploit
Remote data wipe
Key escrow
Business impact assessment
50. Which of the following are restricted to 64-bit block sizes?
Change management
TACACS+
DES;3 DES
Vishing