SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hashing algorithms are used to address which of the following?
Key escrow
Integrity
Sanitization using appropriate software
Account lockout
2. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Penetration testing
Zero day
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Sanitization using appropriate software
3. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
Zero day exploit
Fail state of the system
Image hashes
NIPS
4. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
Botnets
Ask the programmer to replicate the problem in a test environment.
Penetration testing
Code review
5. Which of the following BEST explains the security benefit of a standardized server image?
Two fish
Mandated security configurations have been made to the operating system.
PGP
Change management
6. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?
Key escrow
Personal firewall
RADIUS
Vulnerability scan
7. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
Zero day exploit
TACACS+
It is faster to encrypt an individual file.
Host based firewall
8. Which of the following are security relevant policies?
Clean desk policy
Information classification policy; Network access policy; Auditing and monitoring policy
Mandatory vacations
Sanitization using appropriate software
9. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
PEAP
Antenna placement; Power-level control
SNMPv3
Something you are - something you have
10. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?
Fuzzing
Continuous monitoring
SSH
Change management
11. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
Mandatory access control
SQL injection
Public key
Worm outbreak
12. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
TACACS+
SQL injection
Deploy an anti-spam device to protect the network.
Account lockout
13. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from
Error handling
Change management
To limit the number of endpoints connected through the same switch port
PEAP
14. Which of the following is where an unauthorized device is found allowing access to a network?
To limit the number of endpoints connected through the same switch port
Rogue access point
Protocol analyzers
Zero day
15. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Deploy an anti-spam device to protect the network.
Trust model
Separation of duties
16. Which of the following activities should be completed in order to detect anomalies on a network?
Log reviews
Personally owned devices
Code review
Personal firewall
17. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
To limit the number of endpoints connected through the same switch port
Sanitization using appropriate software
War chalking
Signature based
18. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Device encryption
Cold site
Install application updates
Public key
19. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Personal firewall
Ticket granting server
NIPS
E-discovery
20. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
Penetration test
IPS
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
dcfldd
21. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?
Zero day exploit
Confidentiality
MD5
Anti-spam
22. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Deploy an anti-spam device to protect the network.
RADIUS
Encrypt all confidential data.
Spam fitters
23. An example of a false negative
Cross-site scripting
Port forwarding
The IDS does not identify a buffer overflow
Failsafe
24. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
AP power levels
Verify the user's identity
Ticket granting server
TPM
25. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Antenna placement; Power-level control
Key escrow
Zero day attack
Cross-site scripting
26. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Proxy server
Mitigate risk and develop a maintenance plan.
CA
The DES algorithm is run three consecutive times against the item being encrypted.
27. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Detective
Dictionary; Brute force
MAC filtering
Impact; Likelihood
28. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
IPS
23
Mandatory vacations
Account expiration
29. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
ARP poisoning
Dictionary; Brute force
Spam filter
Memory dump - ARP cache
30. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
Failsafe
Ask the programmer to replicate the problem in a test environment.
Confidentiality
Mitigate risk and develop a maintenance plan.
31. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
Mandate additional security awareness training for all employees.
CA
Separation of duties
Mean time to restore
32. A packet filtering firewall can protect from which of the following?
Gray box
Port scan
IPS
NIPS
33. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
Port scan
Compare hashes of the original source and system image.
Use Starbuck's private key to sign the binary
Device encryption
34. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
MD5 checksum
Full disk
E-discovery
Account lockout
35. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Loop protection
CRL
Proxies
36. Which of the following has a default port of 22?
NTLM
Use Starbuck's private key to sign the binary
Separation of duties
SSH
37. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
RBAC
Power levels
Input validation
File encryption
38. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
CA
PGP
Impersonation
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
39. Which of the following authentication protocols forces centralized wireless authentication?
Anti-spam
LDAP
WPA2-Enterprise
Private key
40. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?
Install both the private and the public key on the web server.
Proxy server
Proxies
Subnetting
41. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Continuous monitoring
Fuzzing
SQL injection
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
42. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?
Rootkit
Remotely initiate a device wipe
Two fish
SSH
43. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?
Account lockout
RAID 5 and a storage area network
Firewall
Warm site
44. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Mitigation
Establish a MAC limit and age
Image hashes
SQL injection
45. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Succession planning
Trust model
Key escrow
The IDS does not identify a buffer overflow
46. Which of the following is a best practice when securing a switch from physical access?
VLAN mismatch is occurring.
Device encryption
Warm site
Disable unused ports
47. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?
Port scan
Mitigation
Mitigate risk and develop a maintenance plan.
Zero day exploit
48. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Validate the identity of an email sender;Encrypt messages;Decrypt messages
23
Separation of duties
Cross-site scripting
49. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
Device encryption
Personally owned devices
Trust model
War chalking
50. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Evil twin
Impersonation
Loop protection
SSH