Test your basic knowledge |

Comptia Security +: Cyber Ops

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hashing algorithms are used to address which of the following?






2. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?






3. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?






4. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?






5. Which of the following BEST explains the security benefit of a standardized server image?






6. Which of the following open standards should Mal - a security administrator - select for remote authentication of users?






7. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?






8. Which of the following are security relevant policies?






9. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?






10. Which of the following is the MOST secure protocol for Mal - an administrator - to use for managing network devices?






11. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?






12. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?






13. Mal - a user - submitted a form on the Internet but received an unexpected response shown below Server Error in "/" Application Runtime error in script on asp.net version 2.0 Which of the following controls should be put in place to prevent Mal from






14. Which of the following is where an unauthorized device is found allowing access to a network?






15. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?






16. Which of the following activities should be completed in order to detect anomalies on a network?






17. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?






18. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?






19. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?






20. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?






21. Which of the following should Mal - an administrator - use to verify the integrity of a downloaded file?






22. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?






23. An example of a false negative






24. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?






25. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?






26. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?






27. Account lockout is a mitigation strategy used by Starbuck - the administrator - to combat which of the following attacks?






28. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?






29. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?






30. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?






31. Starbuck has a vendors server in-house for shipping and receiving. She wants to ensure that if the server goes down that the server in-house will be operational again within 24 hours. Which of the following should Starbuck define with the vendor?






32. A packet filtering firewall can protect from which of the following?






33. River Tam - a forensic investigator - believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?






34. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?






35. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?






36. Which of the following has a default port of 22?






37. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?






38. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an






39. Which of the following authentication protocols forces centralized wireless authentication?






40. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?






41. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should






42. Starbuck - the administrator - is tasked with deploying a strong encryption cipher. Which of the following ciphers would she be the LEAST likely to choose?






43. A company wants to have a backup site that is a good balance between cost and recovery time objectives. Which of the following is the BEST solution?






44. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?






45. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?






46. Which of the following is a best practice when securing a switch from physical access?






47. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?






48. Jayne - a security administrator - needs to Telnet into a router to change some configurations. Which of the following ports would need to be open to allow Jayne to change the configurations?






49. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?






50. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?