SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?
MD5
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
Dual-homing a server
Antenna placement; Power-level control
2. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Impersonation
Key escrow
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Disable unused ports
3. River Tam - a security administrator - suspects that a web server may be under attack. The web logs have several entries containing variations of the following entries: 'or 1=1-- or1'=1-- 'or1=1'
Single point of failure
SQL injection
Change management
Rootkit
4. When integrating source material from an open source project into a highly secure environment - which of the following precautions should prevent hidden threats?
RAID 5 and a storage area network
Non-repudiation
MD5
Code review
5. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?
Humidity controls
NTLM
Discretionary access control
Passive finger printing
6. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
War chalking
Sanitization using appropriate software
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Ask the programmer to replicate the problem in a test environment.
7. Starbuck - a security administrator - has applied security labels to files and folders to manage and restrict access. Which of the following is Starbuck using?
Personal firewall
Mandatory access control
Install both the private and the public key on the web server.
Loop protection
8. Which of the following malware types is MOST commonly associated with command and control?
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
Ask the programmer to replicate the problem in a test environment.
Proxy server
Botnets
9. Jayne - a systems security engineer - is determining which credential-type authentication to use within a planned 802.1x deployment. He is looking for a method that does not require a client certificate - has a server side certificate - and uses TLS
Single sign-on
Port scanner
P2P
PEAP-MSCHAPv2
10. Which of the following is BEST utilized to actively test security controls on a particular system?
Penetration test
The IDS does not identify a buffer overflow
NIPS
Software as a Service
11. The fundamental information security principals include confidentiality - availability and which of the following?
UDP 53
Port scanner
Failsafe
The capacity of a system to resist unauthorized changes to stored information
12. Marketing creates a new folder and requests the following access be assigned: Sales Department - Read Marketing Department - Full Control Inside Sales - Read Write This is an example of which of the following?
80
RADIUS
RBAC
Improper input validation
13. When Mal - an employee - leaves a company - which of the following should be updated to ensure Pete's security access is reduced or eliminated?
Rootkit
PEAP-MSCHAPv2
CRL
Change management
14. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Proxies
Mandatory vacations
Protocol analyzers
Loop protection
15. Which of the following encrypts the body of a packet - rather than just the password - while sending information?
GSM phone card and PIN
TACACS+
Application hardening
Key escrow
16. Which of the following security controls enforces user permissions based on a job role?
Signature based
SQL injection
Group based privileges
Continuous monitoring
17. Which of the following reduces the likelihood of a single point of failure when a server fails?
Clustering
dcfldd
Separation of duties
The system is virtualized
18. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
NIPS
Mandated security configurations have been made to the operating system.
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
WPA2-PSK
19. Which of the following control types is video monitoring?
Signature based
Sanitization using appropriate software
Host based firewall
Detective
20. Which of the following allows a server to request a website on behalf of Starbuck - a user?
MAC filtering
CRL
Log reviews
Proxies
21. When moving from an internally controlled environment to a fully outsourced infrastructure environment - such as cloud computing - it is MOST important to...
Separation of duties
Memory dump - ARP cache
TACACS+
Encrypt all confidential data.
22. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Change management
Spam fitters
PEAP-MSCHAPv2
Sanitization using appropriate software
23. Which of the following activities should be completed in order to detect anomalies on a network?
SSH
The security company is provided with no information about the corporate network or physical locations.
Log reviews
Mandatory Access Controls
24. Which of the following types of data encryption would Starbuck - a security administrator - use if MBR and the file systems needed to be included?
Spam filter
Full disk
E-discovery
Account lockout
25. Which of the following implements two factor authentication based on something you know and something you have?
SNMPv3
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Cipher lock combination and proximity badge
Rootkit
26. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
Cross-site scripting
War chalking
Humidity controls
RAID 5 and a storage area network
27. The corporate NIPS requires a daily download from its vendor with updated definitions in order to block the latest attacks. Which of the following describes how the NIPS is functioning?
It is faster to encrypt an individual file.
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Install both the private and the public key on the web server.
Signature based
28. Which of the following accurately describes the STRONGEST multifactor authentication?
Dictionary; Brute force
The DES algorithm is run three consecutive times against the item being encrypted.
Something you are - something you have
The intermediate CA's public key
29. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
Cipher lock combination and proximity badge
Information classification policy; Network access policy; Auditing and monitoring policy
Integrity
NAC
30. When used alone - which of the following controls mitigates the risk of River Tam - an attacker - launching an online brute force password attack?
Cross-site scripting
It is faster to encrypt an individual file.
RAS
Account lockout
31. Employees are reporting that they are receiving unusual calls from the help desk for the purpose of verifying their user credentials. Which of the following attack types is occurring?
Fuzzing
Vishing
Something you are
Input validation
32. In a wireless network - which of the following components could cause too much coverage - too little coverage - and interference?
Zero day attack
AP power levels
Botnets
Cable locks
33. Which of the following can Mal - an administrator - use to verify that a downloaded file was not corrupted during the transfer?
MAC filtering
Public key
Passive finger printing
MD5 checksum
34. River Tam and Starbuck - users - are reporting an increase in the amount of unwanted email that they are receiving each day. Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?
SSH
UDP 53
Power levels
Deploy an anti-spam device to protect the network.
35. Which of the following is the MOST important security requirement for mobile devices storing PII?
Risk avoidance
Zero day attack
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
Remote data wipe
36. Jayne - the security administrator - notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks
Input validation
Something you are
Vulnerability scan
Separation of duties
37. Mal - a network administrator - implements the spanning tree protocol on network switches. Which of the following issues does this address?
Account lockout
Sanitization using appropriate software
Loop protection
NAC
38. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
The security company is provided with no information about the corporate network or physical locations.
Mitigation
Subnetting
Non-repudiation
39. Which of the following should River Tam - a security technician - perform as the FIRST step when creating a disaster recovery plan for a mission critical accounting system?
CRL
Full disk encryption
Business impact assessment
Humidity controls
40. Which of the following risks could IT management be mitigating by removing an all-in-one device?
Cross-site scripting
Impersonation
Single point of failure
Blowfish
41. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
RAS
ARP poisoning
Non-repudiation
Protocol analyzer
42. Which of the following policies is implemented in order to minimize data loss or theft?
Port scanner
Verify the user's identity
PII handling
RADIUS
43. Which of the following ports would be blocked if Mal - a security administrator - wants to deny access to websites?
Gray box
Protocol analyzers
MD5 checksum
80
44. Which of the following should be implemented to secure Pete's - a network administrator - day-today maintenance activities?
Personally owned devices
Gray box
TACACS+; SSH
Install both the private and the public key on the web server.
45. An SQL injection vulnerability can be caused by which of the following?
Proxies
War chalking
Improper input validation
Rogue access point
46. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Something you are - something you have
Mandatory Access Controls
Shoulder surfing
Impersonation
47. Which of the following is a feature of Kerberos?
RAS
Dual-homing a server
23
Single sign-on
48. Which of the following is used to verify the identity of the sender of a signed email?
Fuzzing
VLAN mismatch is occurring.
Public key
NTLM
49. Starbuck's - a user - word processing software is exhibiting strange behavior - opening and closing itself at random intervals. There is no other strange behavior on the system. Which of the following would mitigate this problem in the future?
Group based privileges
The system is virtualized
Install application updates
Cable locks
50. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
Mandatory vacations
Private key
Device encryption
Fuzzing