Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






2. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






3. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






4. Which of the following is the MAIN benefit of server-side versus client-side input validation?






5. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






6. Which of the following is based on X.500 standards?






7. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?






8. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks






9. Which of the following activities should be completed in order to detect anomalies on a network?






10. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?






11. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






12. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






13. The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?






14. A company is performing internal security audits after a recent exploitation on one of their proprietary applications. River Tam - the security auditor - is given the workstation with limited documentation regarding the application installed for the






15. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






16. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






17. Hashing algorithms are used to address which of the following?






18. Which of the following is BEST associated with PKI?






19. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator






20. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






21. Which of the following network devices will prevent port scans?






22. Jayne - a security administrator - wants to allow content owners to determine who has access to tiles. Which of the following access control types does this describe?






23. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?






24. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?






25. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin






26. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...






27. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






28. Which of the following does Starbuck - a software developer - need to do after compiling the source code of a program to attest the authorship of the binary?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


29. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






30. Which of the following is a feature of Kerberos?






31. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






32. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






33. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...






34. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






35. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






36. Which of the following is a reason why Mal - a security administrator - would implement port security?






37. Which of the following BEST explains the security benefit of a standardized server image?






38. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






39. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






40. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






41. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






42. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






43. Which of the following authentication protocols forces centralized wireless authentication?






44. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






45. Which of the following is where an unauthorized device is found allowing access to a network?






46. Which of the following is an improved version of the LANMAN hash?






47. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?






48. Which of the following is a best practice when securing a switch from physical access?






49. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?






50. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee