SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following functions of a firewall allows Mal - an administrator - to map an external service to an internal host?
Port forwarding
Change management
Deploy an anti-spam device to protect the network.
Botnets
2. A company notices that there is a flaw in one of their proprietary programs that the company runs in-house. The flaw could cause damage to the HVAC system. Which of the following would the company transfer to an insurance company?
To limit the number of endpoints connected through the same switch port
Risk
Server-side input validation results in a more secure system than client-side input validation.
NTLM
3. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Separation of duties
Improper input validation
Mandated security configurations have been made to the operating system.
PGP
4. Which of the following would Mal - a security administrator - change to limit how far a wireless signal will travel?
Power levels
Mitigation
Subnetting
SQL injection
5. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Deploying and using a trusted OS
Disable unused ports
Risk
Rootkit
6. While River Tam is logging into the server from her workstation - she notices Mal watching her enter the username and password. Which of the following social engineering attacks is Mal executing?
The security company is provided with no information about the corporate network or physical locations.
Shoulder surfing
Cold site
The system is virtualized
7. Which of the following is a policy that would force all users to organize their areas as well as help in reducing the risk of possible data theft?
Cross-site scripting
Loop protection
Clean desk policy
Anti-spam
8. Which of the following describes the ability for a third party to verify the sender or recipient of a given electronic message during authentication?
Clean desk policy
Personally owned devices
Detective
Non-repudiation
9. Which of the following administrative controls BEST mitigates the risk of ongoing inappropriate employee activities in sensitive areas?
Mandatory vacations
Encrypt all confidential data.
Rogue access point
Account lockout
10. River Tam - a network security administrator - has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication - with passwords being changed every wee
Key escrow
WPA2-PSK
E-discovery
Account expiration
11. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
RADIUS
Proxies
CA
Signature based
12. Starbuck - an IT security technician working at a bank - has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
dcfldd
Confidentiality
File encryption
Firewall
13. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
ARP poisoning
Private key
Vishing
Clean desk policy
14. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
Port forwarding
Fuzzing
Fraggle attack
MD5 checksum
15. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
Antenna placement; Power levels
Zero day exploit
Firewall
Personal firewall
16. Which of the following encrypts the body of a packet - rather than just the password - while sending information?
TACACS+
Single sign-on
Zero day
PII handling
17. Which of the following practices reduces the attack surface of a wireless network?
Antenna placement; Power-level control
Account lockout
Worm outbreak
Temperature and humidity controls
18. Which of the following is Starbuck - a security administrator - MOST likely implementing when deleting all the unneeded files and modules of a newly install application?
NAC
Detective
Port scan
Application hardening
19. The IT Security Department has completed an internal risk assessment and discovered the use of an outdated antivirus definition file. Which of the following is the NEXT step that management should take?
Proxies
21
Remote data wipe
Mitigate risk and develop a maintenance plan.
20. Which of the following attacks is characterized by River Tam attempting to send an email from a Chief Information Officer's (CIO's) non-corporate email account to an IT staff member in order to have a password changed?
Use Starbuck's private key to sign the binary
Impersonation
Clustering
The DES algorithm is run three consecutive times against the item being encrypted.
21. Which of the following BEST allows Mal - a security administrator - to determine the type - source - and flags of the packet traversing a network for troubleshooting purposes?
Rogue access point
Risk avoidance
VLAN mismatch is occurring.
Protocol analyzers
22. Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
Install application updates
Change management
PEAP-MSCHAPv2
Vishing
23. Which of the following controls mitigates the risk of Jayne - an attacker - gaining access to a company network by using a former employee's credential?
Cross-site scripting
Detective
Full disk
Account expiration
24. Mal - the Chief Executive Officer (CEO) of a company - has increased his travel plans for the next two years to improve business relations. Which of the following would need to be in place in case something happens to Pete?
Succession planning
Device encryption
Encrypt all confidential data.
The DES algorithm is run three consecutive times against the item being encrypted.
25. An application programmer reports to River Tam - the security administrator - that the antivirus software installed on a server is interfering with one of the production HR applications - and requests that antivirus be temporarily turned off. How sho
SSH
Information classification policy; Network access policy; Auditing and monitoring policy
Penetration test
Ask the programmer to replicate the problem in a test environment.
26. A computer is put into a restricted VLAN until the computer's virus definitions are up-to-date. Which of the following BEST describes this system type?
Anti-spam
Sanitization using appropriate software
NAC
Encrypt all confidential data.
27. Which of the following is the purpose of the spanning tree protocol?
Loop protection
Impersonation
Business impact assessment
NTLM
28. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Port scan
Sanitization using appropriate software
Risk avoidance
DES;3 DES
29. Which of the following multifactor authentication methods uses biometrics?
Something you are
Mean time to restore
Something you are - something you have
Account lockout
30. The fundamental information security principals include confidentiality - availability and which of the following?
Penetration test
The capacity of a system to resist unauthorized changes to stored information
Shoulder surfing
Software as a Service
31. Which of the following would River Tam - a security administrator - utilize to identity a weakness within various applications without exploiting that weakness?
Vulnerability scan
Validate the identity of an email sender;Encrypt messages;Decrypt messages
Fail state of the system
TPM
32. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
Penetration test
Full disk
Memory dump - ARP cache
Separation of duties
33. Several users' computers are no longer responding normally and sending out spam email to the users' entire contact list. This is an example of which of the following?
Impersonation
Worm outbreak
Account lockout
Cable locks
34. Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?
Cross-site scripting
Evil twin
Port scan
Change management
35. While performing basic forensic analysis of a hard drive in River Tam's - the security administrator - possession - which of the following should be verified during the analysis?
Image hashes
PGP
Cold site
Risk avoidance
36. An example of a false negative
Remote data wipe
The IDS does not identify a buffer overflow
Change management
ARP poisoning
37. Which of the following can River Tam - a security administrator - implement to ensure that encrypted files and devices can be recovered if the passphrase is lost?
Cable locks
Two fish
Key escrow
SSH
38. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
Impersonation
Temperature and humidity controls
Port forwarding
E-discovery
39. River Tam - a security administrator - has generated a key pair for the company web server. Which of the following should she do next to ensure all web traffic to the company web server is encrypted?
Business impact assessment
MD5
dcfldd
Install both the private and the public key on the web server.
40. Which of the following should be implemented to restrict wireless access to the hardware address of a NIC?
Cipher lock combination and proximity badge
MAC filtering
Personally owned devices
Install both the private and the public key on the web server.
41. River Tam - a security guard - reports that the side of the company building has been marked with spray paint. Which of the following could this be an example of?
War chalking
SNMPv3
Host based firewall
PEAP-MSCHAPv2
42. Which of the following is an example of authentication using something Starbuck - a user - has and something she knows?
GSM phone card and PIN
Change management
Single sign-on
Notify security to identify employee's whereabouts.
43. River Tam - a user - on a public Wi-Fi network logs into a webmail account and is redirected to a search engine. Which of the following attacks may be occurring?
Botnets
Evil twin
Firewall
NIPS
44. Which of the following technologies would allow the removal of a single point of failure?
Dual-homing a server
Mitigation
SQL injection
The intermediate CA's public key
45. Which of the following is similar to a smurf attack - but uses UDP instead to ICMP?
ARP poisoning
Impersonation
Risk avoidance
Fraggle attack
46. Which of the following password policies is the MOST effective against a brute force network attack?
Proxies
Fuzzing
Account lockout
DES;3 DES
47. River Tam - a security administrator - has configured a trusted OS implementation on her servers. Which of the following controls are enacted by the trusted OS implementation?
Application hardening
Mandatory Access Controls
E-discovery
Single point of failure
48. Which of the following are security relevant policies?
Information classification policy; Network access policy; Auditing and monitoring policy
RAS
Cross-site scripting
The system is virtualized
49. Which of the following are restricted to 64-bit block sizes?
Install application updates
RAID 5 and a storage area network
Fraggle attack
DES;3 DES
50. A company has sent all of its private keys to a third party. The third party company has created a secure list of these keys. Which of the following has just been implemented?
Key escrow
Cipher lock combination and proximity badge
Code review
Fail state of the system