Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?






2. Which of the following malware types is BEST described as protecting itself by hooking system processes and hiding its presence?






3. Which of the following is the purpose of the spanning tree protocol?






4. Which of the following should River Tam - a security technician - perform as the FIRST step when creating a disaster recovery plan for a mission critical accounting system?






5. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?






6. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






7. Jayne - the administrator - has been told to confirm what account an email was sent from. Which of the following is this an example of?






8. Starbuck - a user - has reported an increase in email phishing attempts. Which of the following can be implemented to mitigate the attacks?






9. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






10. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?






11. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






12. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






13. Which of the following activities should be completed in order to detect anomalies on a network?






14. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?






15. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?






16. An administrator responsible for building and validating security configurations is a violation of which of the following security principles?






17. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho






18. Which of the following are restricted to 64-bit block sizes?






19. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?






20. Which of the following is a feature of Kerberos?






21. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






22. Which of the following malware types is MOST commonly associated with command and control?






23. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






24. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






25. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?






26. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






27. Which of the following is the MOST important security requirement for mobile devices storing PII?






28. Which of the following combinations represents multifactor authentication?






29. Which of the following allows a server to request a website on behalf of Starbuck - a user?






30. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






31. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






32. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






33. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut






34. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






35. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






36. Which of the following security chips does BitLocker utilize?






37. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






38. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






39. A valid server-role in a Kerberos authentication system






40. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






41. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






42. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?






43. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






44. Which of the following should be done before resetting a user's password due to expiration?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


45. Which of the following practices reduces the attack surface of a wireless network?






46. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






47. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






48. Which of the following security controls enforces user permissions based on a job role?






49. Which of the following BEST explains the security benefit of a standardized server image?






50. A packet filtering firewall can protect from which of the following?