SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
ARP poisoning
Port forwarding
Antenna placement; Power-level control
SSH
2. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
Business impact assessment
Account expiration
PII handling
DES;3 DES
3. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
MAC filtering
Trust model
DES;3 DES
Mandatory Access Controls
4. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
Change management
The security company is provided with no information about the corporate network or physical locations.
Code review
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
5. Which of the following security tools can Starbuck - a security administrator - use to deter theft?
Spam filter
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Cable locks
dcfldd
6. Which of the following is the purpose of the spanning tree protocol?
Account lockout
Loop protection
CRL
Private key
7. The fundamental information security principals include confidentiality - availability and which of the following?
The IDS does not identify a buffer overflow
Improper input validation
Antenna placement; Power levels
The capacity of a system to resist unauthorized changes to stored information
8. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
Time of day restrictions;Access control lists
Sanitization using appropriate software
CA
VLAN mismatch is occurring.
9. Which of the following could River Tam - an administrator - use in a workplace to remove sensitive data at rest from the premises?
Improper input validation
Worm outbreak
The DES algorithm is run three consecutive times against the item being encrypted.
Personally owned devices
10. Which of the following security chips does BitLocker utilize?
Private key
Firewall
RAS
TPM
11. Which of the following is the BEST incident response procedure to take when a previous employee enters a facility?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Which of the following has a default port of 22?
SNMPv3
Two fish
RADIUS
SSH
13. Jayne - a security administrator - is responsible for provisioning role-based user accounts in an enterprise environment. A user has a temporary business need to perform multiple roles within the organization. Which of the following is the BEST solut
Assign multiple roles to the existing user ID
Separation of duties
Code review
TACACS+; SSH
14. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Zero day
Two fish
Deploying and using a trusted OS
Warm site
15. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Change management
Install both the private and the public key on the web server.
Install application updates
Application hardening
16. Which of the following authentication protocols forces centralized wireless authentication?
dcfldd
WPA2-Enterprise
Host based firewall
Single point of failure
17. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Penetration test
Trust model
PGP
Port scan
18. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
Install both the private and the public key on the web server.
UDP 53
The capacity of a system to resist unauthorized changes to stored information
Establish a MAC limit and age
19. Jayne's CRL is over six months old. Which of the following could Jayne do in order to ensure he has the current information?
Update the CRL; Deploy OCSP
Input validation
Detective
Establish a MAC limit and age
20. Mal - a security administrator - would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of th
Risk avoidance
Port scanner
Loop protection
Loop protection
21. Which of the following is an attack where Mal spreads USB thumb drives throughout a bank's parking lot in order to have malware installed on the banking systems?
Mandatory access control
Mean time to restore
Social engineering
Information classification policy; Network access policy; Auditing and monitoring policy
22. Which of the following activities should be completed in order to detect anomalies on a network?
Log reviews
Compare hashes of the original source and system image.
Spam filter
Remotely initiate a device wipe
23. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
Non-repudiation
Anti-spam
Sanitization using appropriate software
Separation of duties
24. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Humidity controls
Vishing
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
25. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
SQL injection
Disable unused ports
Rogue access point
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
26. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
23
Cross-site scripting
Subnetting
Port scan
27. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
WPA2-Enterprise
Host based firewall
Remote wipe
Image hashes
28. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
SSH
Loop protection
Impersonation
Personal firewall
29. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
Account lockout
RADIUS
Cold site
UDP 53
30. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
Impersonation
Cable locks
DES;3 DES
CA
31. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Account lockout
Full disk encryption
Vishing
Impersonation
32. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Sanitization using appropriate software
Mitigate risk and develop a maintenance plan.
Key escrow
File encryption
33. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
War chalking
MAC filtering
Clustering
Improper input validation
34. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
Botnets
The system is virtualized
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
File encryption
35. Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?
RADIUS
PGP
LDAP
Separation of duties
36. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
It is faster to encrypt an individual file.
Mandatory access control
Key escrow
Firewall
37. Which of the following is where an unauthorized device is found allowing access to a network?
Rogue access point
Clean desk policy
Install application updates
Protocol analyzer
38. A company is installing a wireless network in a building that houses several tenants. Which of the following should be considered to make sure none of the other tenants can detect the company's wireless network?
Key escrow
Impersonation
Loop protection
Antenna placement; Power levels
39. The human resources department of a company has requested full access to all network resources - including those of the financial department. Starbuck - the administrator - denies this - citing...
Impersonation
Fraggle attack
Blowfish
Separation of duties
40. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
IPS
Mandatory access control
Anti-spam
PEAP
41. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...
Disable unused ports
Encrypt all confidential data.
Spam filter
Impersonation
42. Which of the following attacks would be used if River Tam - a user - is receiving unwanted text messages?
Key escrow
Dual-homing a server
Spam fitters
Blue jacking
43. Which of the following password policies is the MOST effective against a brute force network attack?
Account lockout
PEAP
RBAC
Mitigation
44. Which of the following mitigates the risk of proprietary information being compromised?
PEAP-MSCHAPv2
Mandatory access control
Trust model
File encryption
45. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?
Error handling
Impersonation
23
Install application updates
46. Which of the following control types is video monitoring?
Detective
Integrity
Humidity controls
80
47. Social networking sites are used daily by the marketing team for promotional purposes. However - confidential company information - including product pictures and potential partnerships - have been inadvertently exposed to the public by dozens of emp
Memory dump - ARP cache
UDP 53
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Mandate additional security awareness training for all employees.
48. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
Something you are
Mandatory access control
Confidentiality
Zero day exploit
49. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Antenna placement; Power levels
Install application updates
Device encryption
Compare hashes of the original source and system image.
50. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Impersonation
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
TACACS+; SSH
Impact; Likelihood