Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?






2. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?






3. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






4. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






5. Which of the following security tools can Starbuck - a security administrator - use to deter theft?






6. Which of the following is the purpose of the spanning tree protocol?






7. The fundamental information security principals include confidentiality - availability and which of the following?






8. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






9. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?






10. Which of the following security chips does BitLocker utilize?






11. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Which of the following has a default port of 22?






13. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut






14. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






15. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?






16. Which of the following authentication protocols forces centralized wireless authentication?






17. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?






18. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






19. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?






20. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th






21. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?






22. Which of the following activities should be completed in order to detect anomalies on a network?






23. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?






24. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






25. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'






26. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?






27. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






28. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?






29. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






30. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






31. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






32. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






33. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?






34. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






35. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?






36. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?






37. Which of the following is where an unauthorized device is found allowing access to a network?






38. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?






39. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...






40. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






41. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...






42. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






43. Which of the following password policies is the MOST effective against a brute force network attack?






44. Which of the following mitigates the risk of proprietary information being compromised?






45. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?






46. Which of the following control types is video monitoring?






47. Social networking sites are used daily by the marketing team for promotional purposes. However - confidential company information - including product pictures and potential partnerships - have been inadvertently exposed to the public by dozens of emp






48. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?






49. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






50. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?