SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
E-discovery
Penetration testing
Vulnerability scan
Remote wipe
2. Which of the following network devices will prevent port scans?
Update the CRL; Deploy OCSP
Firewall
Integrity
Clustering
3. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Antenna placement; Power-level control
Gray box
PGP
Cold site
4. Which of the following accurately describes the STRONGEST multifactor authentication?
Something you are - something you have
Business impact assessment
Spam filter
SSH
5. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
Deploy an anti-spam device to protect the network.
Application hardening
File encryption
Cross-site scripting
6. Which of the following combinations represents multifactor authentication?
IPS
Cipher lock combination and proximity badge
Vishing
Anti-spam
7. Which of the following are security relevant policies?
Protocol analyzer
MD5 checksum
NIPS
Information classification policy; Network access policy; Auditing and monitoring policy
8. Which of the following is BEST utilized to actively test security controls on a particular system?
Deploying and using a trusted OS
MD5 checksum
Penetration test
Sanitization using appropriate software
9. Which of the following attacks is manifested as an embedded HTML image object or JavaScript image tag in an email?
MD5 checksum
Cross-site scripting
Public key
Rootkit
10. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
Spam fitters
MD5 checksum
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
21
11. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
Impersonation
The IDS does not identify a buffer overflow
Error handling
Something you are - something you have
12. Which of the following is the purpose of the spanning tree protocol?
MD5
Loop protection
Private key
Continuous monitoring
13. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
File encryption
Sanitization using appropriate software
The DES algorithm is run three consecutive times against the item being encrypted.
Personal firewall
14. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator
Encrypt all confidential data.
VLAN mismatch is occurring.
Proxy server
Shoulder surfing
15. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
Account lockout
Worm outbreak
Cable locks
Temperature and humidity controls
16. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Assign multiple roles to the existing user ID
21
Fraggle attack
Mandatory Access Controls
17. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?
dcfldd
Separation of duties
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Mandatory Access Controls
18. Which of the following mitigates the risk of proprietary information being compromised?
dcfldd
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
File encryption
Continuous monitoring
19. Which of the following activities should be completed in order to detect anomalies on a network?
MAC filtering
Mandatory vacations
dcfldd
Log reviews
20. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Clean desk policy
Humidity controls
Input validation
Warm site
21. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Single sign-on
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
SSH
Change management
22. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
It is faster to encrypt an individual file.
Rogue access point
Assign multiple roles to the existing user ID
Mitigate risk and develop a maintenance plan.
23. Which of the following technologies would allow the removal of a single point of failure?
Dual-homing a server
Server-side input validation results in a more secure system than client-side input validation.
Risk avoidance
IPS
24. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Loop protection
Subnetting
AP power levels
RAS
25. Which of the following is the MOST important security requirement for mobile devices storing PII?
Clustering
Remote data wipe
The system is virtualized
21
26. Starbuck - a security technician - wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
NIPS
Impersonation
Cipher lock combination and proximity badge
PEAP
27. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
Botnets
Spam fitters
SNMPv3
Private key
28. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Evil twin
23
Time of day restrictions;Access control lists
War chalking
30. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
NIPS
P2P
Anti-spam
Vulnerability scan
31. River Tam - an attacker - is recording a person typing in their ID number into a keypad to gain access to the building. River Tam then calls the helpdesk and informs them that their PIN no longer works and would like to change it. Which of the follow
Cross-site scripting
21
WPA2-PSK
Impersonation
32. Jayne - a system administrator - wants to establish a nightly available SQL database. Which of the following would be implemented to eliminate a single point of failure in storage and servers?
RAS
RAID 5 and a storage area network
Deploy an anti-spam device to protect the network.
Risk
33. Which of the following practices reduces the attack surface of a wireless network?
Antenna placement; Power-level control
Rootkit
The IDS does not identify a buffer overflow
80
34. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
Personal firewall
DES;3 DES
Protocol analyzer
IV attack
35. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
Fraggle attack
Cross-site scripting
Non-repudiation
Power levels
36. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?
Discretionary access control
E-discovery
SSH
PGP
37. Which of the following is where an unauthorized device is found allowing access to a network?
SSH
Rogue access point
Personal firewall
PGP
38. Which of the following BEST explains the security benefit of a standardized server image?
The IDS does not identify a buffer overflow
NIPS
Mandated security configurations have been made to the operating system.
War chalking
39. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Establish a MAC limit and age
Impersonation
The security company is provided with no information about the corporate network or physical locations.
Clustering
40. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
Cable locks
Key escrow
Compare hashes of the original source and system image.
P2P
41. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Account lockout
Ticket granting server
Public key
The security company is provided with no information about the corporate network or physical locations.
42. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
Single sign-on
Botnets
SQL injection
MD5 checksum
43. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
Assign multiple roles to the existing user ID
Vishing
Blowfish
Discretionary access control
44. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
NIPS
Port scanner
Code review
Protocol analyzers
45. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
MAC filtering
Image hashes
SSH
Two fish
46. Which of the following reduces the likelihood of a single point of failure when a server fails?
WPA2-PSK
Clustering
IPS
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
47. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks
Ticket granting server
Input validation
WPA2-PSK
Fraggle attack
48. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Impersonation
Subnetting
Mitigate risk and develop a maintenance plan.
Full disk
49. The fundamental information security principals include confidentiality - availability and which of the following?
CRL
Firewall
TPM
The capacity of a system to resist unauthorized changes to stored information
50. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
War chalking
Assign multiple roles to the existing user ID
Shoulder surfing
Change management