Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






2. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






3. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






4. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?






5. Which of the following is an improved version of the LANMAN hash?






6. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






7. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






8. Which of the following BEST describes a denial of service attack?






9. Which of the following policies is implemented in order to minimize data loss or theft?






10. Which of the following implements two factor authentication based on something you know and something you have?






11. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






12. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?






13. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






14. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?






15. Which of the following is the MAIN benefit of server-side versus client-side input validation?






16. Which of the following control types is video monitoring?






17. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






18. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






19. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






20. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






21. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






22. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?






23. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?






24. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






25. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?






26. Which of the following allows a server to request a website on behalf of Starbuck - a user?






27. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






28. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?






29. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






30. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?






31. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






32. Which of the following BEST explains the security benefit of a standardized server image?






33. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?






34. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






35. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






36. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






37. An example of a false negative






38. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






39. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?






40. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?






41. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






42. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






43. Mal - the security administrator - is implementing a web content fitter. Which of the following is the MOST important design consideration in regards to availability?






44. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






45. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






46. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






47. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






48. Which of the following password policies is the MOST effective against a brute force network attack?






49. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee






50. 3DES is created when which of the following scenarios occurs?