Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following network solutions would BEST allow Starbuck - a security technician - to host an extranet application for her company?






2. Mal - a security administrator - has configured and implemented an additional public intermediate CA. Which of the following must Mal submit to the major web browser vendors in order for the certificates - signed by this intermediate - to be trusted?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. Which of the following should Starbuck - the security administrator - do FIRST when an employee reports the loss of a corporate mobile device?






4. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?






5. Which of the following is based on X.500 standards?






6. River Tam - a security analyst - suspects that a rogue web server is running on the network. Which of the following would MOST likely be used to identify the server's IP address?






7. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?






8. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?






9. Which of the following is a feature of Kerberos?






10. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?






11. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?






12. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






13. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?






14. A packet filtering firewall can protect from which of the following?






15. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?






16. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






17. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?






18. River Tam - a security administrator - is noticing a slow down in the wireless network response. River Tam launches a wireless sniffer and sees a large number of ARP packets being sent to the AP. Which of the following type of attacks is underway?






19. Which of the following technologies would allow the removal of a single point of failure?






20. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?






21. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






22. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?






23. The log management system at Company A is inadequate to meet the standards required by their corporate governance team. A new automated log management system has been put in place. This is an example of which of the following?






24. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS






25. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






26. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






27. Which of the following network devices will prevent port scans?






28. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia






29. Which of the following is where an unauthorized device is found allowing access to a network?






30. Which of the following combinations represents multifactor authentication?






31. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?






32. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






33. Jayne - a server administrator - sets up database forms based on security rating levels. If a user has the lowest security rating then the database automatically determines what access that user has. Which of the following access control methods does






34. Which of the following accurately describes the STRONGEST multifactor authentication?






35. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...






36. Which of the following BEST explains the security benefit of a standardized server image?






37. Which of the following implements two factor authentication based on something you know and something you have?






38. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






39. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






40. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?






41. Which of the following mitigates the risk of proprietary information being compromised?






42. Which of the following security tools can Starbuck - an administrator - implement to mitigate the risks of theft?






43. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






44. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






45. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






46. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






47. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho






48. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?






49. Which of the following is the MOST important security requirement for mobile devices storing PII?






50. Which of the following are restricted to 64-bit block sizes?