SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?
Software as a Service
Humidity controls
GSM phone card and PIN
Business impact assessment
2. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Clean desk policy
Install application updates
Impersonation
Mitigate risk and develop a maintenance plan.
3. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
80
Logic bomb
Time of day restrictions;Access control lists
NAC
4. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
VLAN mismatch is occurring.
22
RADIUS
Server-side input validation results in a more secure system than client-side input validation.
5. Mal - a security administrator - has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
Mandatory Access Controls
Fuzzing
Mitigate risk and develop a maintenance plan.
NIPS
6. Which of the following password policies is the MOST effective against a brute force network attack?
Account lockout
IPS
SSH
Port scan
7. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
Account lockout
CA
Account expiration
Antenna placement; Power-level control
8. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
Failsafe
Temperature and humidity controls
Device encryption
The system is virtualized
9. Which of the following is BEST associated with PKI?
Private key
Spam fitters
Succession planning
Protocol analyzers
10. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
It is faster to encrypt an individual file.
Two fish
Penetration test
Zero day
11. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
Detective
AP power levels
Blowfish
Social engineering
12. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
P2P
Failsafe
Error handling
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
13. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Power levels
E-discovery
Code review
Mandatory Access Controls
14. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
Logic bomb
Disable unused ports
War chalking
It is faster to encrypt an individual file.
15. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
PEAP
Penetration test
UDP 53
Confidentiality
16. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
Two fish
Rootkit
Impersonation
UDP 53
17. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
Proxy server
Mitigate risk and develop a maintenance plan.
UDP 53
Separation of duties
18. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
Cold site
Port forwarding
Install both the private and the public key on the web server.
Application hardening
19. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?
E-discovery
Disable unused ports
Clustering
Update the CRL; Deploy OCSP
20. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?
E-discovery
RAID 5 and a storage area network
Ask the programmer to replicate the problem in a test environment.
The DES algorithm is run three consecutive times against the item being encrypted.
21. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?
Power levels
TACACS+; SSH
The DES algorithm is run three consecutive times against the item being encrypted.
Mandatory vacations
22. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the
It is faster to encrypt an individual file.
Mandate additional security awareness training for all employees.
Something you are
Gray box
23. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Deploying and using a trusted OS
Firewall
Mitigate risk and develop a maintenance plan.
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
24. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?
Notify security to identify employee's whereabouts.
NIPS
23
Cross-site scripting
25. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Blue jacking
Cross-site scripting
E-discovery
Logic bomb
26. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
Warm site
Vishing
Cipher lock combination and proximity badge
NIPS
27. Which of the following implements two factor authentication based on something you know and something you have?
NAC
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Protocol analyzers
The intermediate CA's public key
28. Which of the following malware types is MOST commonly associated with command and control?
Improper input validation
Disable unused ports
Botnets
Cross-site scripting
29. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Mandatory Access Controls
The intermediate CA's public key
Device encryption
Antenna placement; Power levels
30. Which of the following is a best practice when securing a switch from physical access?
Disable unused ports
Fail state of the system
The intermediate CA's public key
Impersonation
31. Which of the following BEST describes a denial of service attack?
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
22
MD5 checksum
LDAP
32. The fundamental information security principals include confidentiality - availability and which of the following?
The capacity of a system to resist unauthorized changes to stored information
Worm outbreak
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
The DES algorithm is run three consecutive times against the item being encrypted.
33. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
DES;3 DES
MD5
Change management
Non-repudiation
34. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Something you are - something you have
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
P2P
Protocol analyzers
35. Which of the following may cause Starbuck - the security administrator - to seek an ACL work around?
Fraggle attack
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Zero day exploit
Zero day
36. Which of the following is an improved version of the LANMAN hash?
Cross-site scripting
TACACS+; SSH
NTLM
Vishing
37. Which of the following practices reduces the attack surface of a wireless network?
Port scan
23
PGP
Antenna placement; Power-level control
38. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
ARP poisoning
Cold site
Assign multiple roles to the existing user ID
Deploy an anti-spam device to protect the network.
39. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?
Account expiration
Continuous monitoring
SSH
Port scanner
40. Which of the following network devices will prevent port scans?
Zero day attack
NTLM
Firewall
Anti-spam
41. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
Cross-site scripting
Shoulder surfing
dcfldd
Personal firewall
42. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Logic bomb
Mandatory access control
P2P
Deploying and using a trusted OS
43. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
It is faster to encrypt an individual file.
RAID 5 and a storage area network
Group based privileges
Penetration testing
44. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
VLAN mismatch is occurring.
Worm outbreak
Botnets
Encrypt all confidential data.
46. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
Change management
UDP 53
Subnetting
SSH
47. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?
80
Antenna placement; Power levels
Mandate additional security awareness training for all employees.
TPM
48. An example of a false negative
Proxy server
21
Disable unused ports
The IDS does not identify a buffer overflow
49. Which of the following is the MOST important security requirement for mobile devices storing PII?
Non-repudiation
PII handling
Remote data wipe
WPA2-PSK
50. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks
Error handling
P2P
Input validation
SSH
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests