Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






2. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






3. Which of the following malware types is MOST commonly associated with command and control?






4. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






5. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






6. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






7. An SQL injection vulnerability can be caused by which of the following?






8. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?






9. While traveling - users need access to an internal company web server that contains proprietary information. Mal - the security administrator - should implement a...






10. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






11. Which of the following should be done before resetting a user's password due to expiration?


12. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






13. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?






14. Which of the following is BEST associated with PKI?






15. River Tam - an IT administrator - wants to protect a cluster of servers in a DMZ from zero day attacks. Which of the following would provide the BEST level of protection?






16. Which of the following security tools can Starbuck - a security administrator - use to deter theft?






17. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






18. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






19. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






20. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






21. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






22. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






23. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut






24. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






25. Which of the following BEST explains the security benefit of a standardized server image?






26. Which of the following practices reduces the attack surface of a wireless network?






27. Which of the following combinations represents multifactor authentication?






28. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






29. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






30. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






31. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






32. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






33. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






34. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






35. While traveling Jayne - an employee - decides he would like to download some new movies onto his corporate laptop. While installing software designed to download movies from multiple computers across the Internet. Jayne agrees to share portions of hi






36. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






37. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






38. Which of the following mitigates the risk of proprietary information being compromised?






39. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






40. Which of the following allows a server to request a website on behalf of Starbuck - a user?






41. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia






42. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th






43. The fundamental information security principals include confidentiality - availability and which of the following?






44. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






45. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






46. Which of the following is a feature of Kerberos?






47. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






48. 3DES is created when which of the following scenarios occurs?






49. Jayne - a system administrator - wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?






50. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?