SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following should be done before resetting a user's password due to expiration?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
War chalking
Loop protection
CA
Antenna placement; Power levels
3. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Full disk
Gray box
The system is virtualized
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
4. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
Zero day exploit
Risk
The system is virtualized
Input validation
5. Which of the following are restricted to 64-bit block sizes?
Private key
Use Starbuck's private key to sign the binary
Blue jacking
DES;3 DES
6. Which of the following is used to verify the identity of the sender of a signed email?
Public key
Fuzzing
Server-side input validation results in a more secure system than client-side input validation.
Fuzzing
7. Which of the following is a feature of Kerberos?
Notify security to identify employee's whereabouts.
Protocol analyzers
Warm site
Single sign-on
8. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?
Dictionary; Brute force
TPM
Risk avoidance
NAC
9. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
MD5
Single point of failure
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
IPS
10. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
SSH
Loop protection
Detective
Information classification policy; Network access policy; Auditing and monitoring policy
11. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?
CRL
Clustering
The system is virtualized
Shoulder surfing
12. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
Power levels
The security company is provided with no information about the corporate network or physical locations.
Deploying and using a trusted OS
Protocol analyzers
13. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Deploying and using a trusted OS
Social engineering
Clustering
Fuzzing
14. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?
Full disk encryption
Mandatory access control
Fuzzing
Key escrow
15. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
Passive finger printing
Cross-site scripting
Something you are - something you have
Image hashes
16. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?
Update the CRL; Deploy OCSP
Mean time to restore
MD5
Remotely initiate a device wipe
17. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
It is faster to encrypt an individual file.
Proxies
TACACS+; SSH
Update the CRL; Deploy OCSP
18. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
IPS
Non-repudiation
Rogue access point
Dictionary; Brute force
19. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
SSH
Single sign-on
Risk avoidance
Application hardening
20. Which of the following security chips does BitLocker utilize?
AP power levels
TPM
ARP poisoning
Mandatory access control
21. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Fuzzing
Mandatory access control
Use Starbuck's private key to sign the binary
Blue jacking
22. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th
Dictionary; Brute force
Antenna placement; Power-level control
The system is virtualized
Vulnerability scan
23. Which of the following is BEST associated with PKI?
Antenna placement; Power-level control
RAID 5 and a storage area network
Private key
Spam fitters
24. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?
Mitigate risk and develop a maintenance plan.
CRL
ARP poisoning
MD5
25. A valid server-role in a Kerberos authentication system
SNMPv3
The system is virtualized
Ticket granting server
Something you are
26. River Tam - an administrator - suspects a denial of service attack on the network - but does not know where the network traffic is coming from or what type of traffic it is. Which of the following would help River Tam further assess the situation?
Two fish
Gray box
Full disk
Protocol analyzer
27. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
War chalking
Fuzzing
MAC filtering
To limit the number of endpoints connected through the same switch port
28. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Install both the private and the public key on the web server.
It is faster to encrypt an individual file.
Mandatory access control
Full disk encryption
29. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th
Social engineering
Sanitization using appropriate software
Risk avoidance
Software as a Service
30. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Impersonation
MAC filtering
LDAP
Change management
31. Which of the following policies is implemented in order to minimize data loss or theft?
Trust model
PII handling
Sanitization using appropriate software
Separation of duties
32. Which of the following control types is video monitoring?
Detective
Zero day exploit
Anti-spam
Deploy an anti-spam device to protect the network.
33. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?
Confidentiality
21
Mean time to restore
Shoulder surfing
34. The public key is used to perform which of the following?
The DES algorithm is run three consecutive times against the item being encrypted.
TACACS+; SSH
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Cross-site scripting
35. Which of the following practices reduces the attack surface of a wireless network?
Information classification policy; Network access policy; Auditing and monitoring policy
Antenna placement; Power-level control
Ticket granting server
PEAP-MSCHAPv2
36. Which of the following is the BEST solution to securely administer remote servers?
SSH
Encrypt all confidential data.
Separation of duties
Spam filter
37. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
TPM
Information classification policy; Network access policy; Auditing and monitoring policy
Personal firewall
Improper input validation
38. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Spam fitters
River Tam - the attacker - overwhelms a system or application - causing it to crash and bring the server down to cause an outage.
Dictionary; Brute force
WPA2-Enterprise
39. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
Full disk encryption
Shoulder surfing
Penetration testing
MAC filtering
40. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
MD5
Personally owned devices
NAC
Port scan
41. Which of the following activities should be completed in order to detect anomalies on a network?
Vishing
Log reviews
Full disk
Information classification policy; Network access policy; Auditing and monitoring policy
42. Which of the following is the MOST important security requirement for mobile devices storing PII?
GSM phone card and PIN
Mandatory Access Controls
Remote data wipe
Separation of duties
43. Starbuck - a VPN administrator - was asked to implement an encryption cipher with a MINIMUM effective security of 128-bits. Which of the following should Starbuck select for the tunnel encryption?
WPA2-Enterprise
PEAP
Blowfish
Memory dump - ARP cache
44. Which of the following BEST describes a software vulnerability that is actively being used by River Tam and Starbuck - attackers - before the vendor releases a protective patch or update?
Mandatory access control
Zero day attack
Install application updates
Full disk encryption
45. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
Vulnerability scan
Account lockout
Account expiration
Encrypt all confidential data.
46. Which of the following BEST explains the security benefit of a standardized server image?
Mandated security configurations have been made to the operating system.
Fraggle attack
The IDS does not identify a buffer overflow
80
47. Which of the following reduces the likelihood of a single point of failure when a server fails?
Worm outbreak
IPS
Clustering
Verify the user's identity
48. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?
The intermediate CA's public key
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Device encryption
VLAN mismatch is occurring.
49. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Confidentiality
Encrypt all confidential data.
RAID 5 and a storage area network
Full disk encryption
50. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
Impersonation
22
Loop protection
The security company is provided with no information about the corporate network or physical locations.