SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Cyber Ops
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following data loss prevention strategies mitigates the risk of replacing hard drives that cannot be sanitized?
Succession planning
Vishing
Cross-site scripting
Full disk encryption
2. Which of the following inspects traffic entering or leaving a network to look for anomalies against expected baselines?
Code review
Cross-site scripting
IPS
Something you are
3. Which of the following protocols provides Mal - an administrator - with the HIGHEST level of security for device traps?
War chalking
Impersonation
SNMPv3
AP power levels
4. A valid server-role in a Kerberos authentication system
Port scan
Change management
Ticket granting server
Private key
5. Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
Subnetting
Group based privileges
Update the CRL; Deploy OCSP
Zero day exploit
6. Starbuck - a security administrator - has completed the imaging process for 20 computers that were deployed. The image contains the operating system and all required software. Which of the following is this an example of?
Clean desk policy
Risk
Fail state of the system
Deploying and using a trusted OS
7. Which of the following would be the BEST reason for Starbuck - a security administrator - to initially select individual file encryption over whole disk encryption?
Impact; Likelihood
It is faster to encrypt an individual file.
Group based privileges
Trust model
8. Which of the following malware types is MOST likely to execute its payload after Starbuck - an employee - has left the company?
Logic bomb
Personal firewall
RADIUS
Antenna placement; Power levels
9. After setting up a root CA. which of the following can Mal - a security administrator - implement to allow intermediate CAs to handout keys and certificates?
Vulnerability scan
Trust model
Penetration testing
Logic bomb
10. Which of the following multifactor authentication methods uses biometrics?
Something you are
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Change management
Antenna placement; Power levels
11. Which of the following malware types is MOST commonly associated with command and control?
Botnets
Single point of failure
Vulnerability scan
Fraggle attack
12. An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe?
Zero day
Application hardening
E-discovery
The capacity of a system to resist unauthorized changes to stored information
13. A company needs to remove sensitive data from hard drives in leased computers before the computers are returned to the supplier. Which of the following is the BEST solution?
Establish a MAC limit and age
Gray box
Sanitization using appropriate software
NAC
14. While conducting a network audit - River Tam - a security administrator - discovers that most clients are routing their network traffic through a desktop client instead of the company router. Which of the following is this attack type?
Change management
RAS
RADIUS
ARP poisoning
15. Workers of a small local organization have implemented an off-site location in which the organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
Error handling
Cold site
Key escrow
Improper input validation
16. River Tam - an attacker - calls the company's from desk and tries to gain insider information by providing specific company information to gain the attendant's trust. The front desk immediately alerts the IT department about this incident. This is an
IPS
E-discovery
Error handling
Impersonation
17. The fundamental information security principals include confidentiality - availability and which of the following?
Mandatory access control
Worm outbreak
The capacity of a system to resist unauthorized changes to stored information
Rogue access point
18. Which of the following will help Jayne - an administrator; mitigate the risk of static electricity?
Humidity controls
SNMPv3
Deploy an anti-spam device to protect the network.
Zero day exploit
19. Which of the following security controls enforces user permissions based on a job role?
Protocol analyzer
Group based privileges
Separation of duties
Change management
20. Which of the following is used to verify the identity of the sender of a signed email?
Detective
The DES algorithm is run three consecutive times against the item being encrypted.
SNMPv3
Public key
21. Starbuck - an administrator - is primarily concerned with blocking external attackers from gaining information on remote employees by scanning their laptops. Which of the following security applications is BEST suited for this task?
SNMPv3
Blue jacking
Port scanner
Personal firewall
22. Mal - a security engineer - is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally - the MAC addresses of all five servers appear on th
Integrity
Warm site
Mandatory Access Controls
The system is virtualized
23. Which of the following is the MAIN benefit of server-side versus client-side input validation?
The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
Server-side input validation results in a more secure system than client-side input validation.
Account lockout
Dual-homing a server
24. An SQL injection vulnerability can be caused by which of the following?
Improper input validation
Notify security to identify employee's whereabouts.
Verify the user's identity
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
25. Which of the following would MOST likely be implemented in order to prevent employees from accessing certain websites?
Proxy server
The IDS does not identify a buffer overflow
NTLM
Shoulder surfing
26. In the event of a mobile device being lost or stolen - which of the following BEST protects against sensitive information leakage?
Remote data wipe
Remote wipe
Temperature and humidity controls
Something you are - something you have
27. River Tam - the security engineer - has discovered that a breach is in progress on a non-production system of moderate importance. Which of the following should River Tam collect FIRST?
UDP 53
Mitigation
Memory dump - ARP cache
Worm outbreak
28. Which of the following is used by Jayne - a security administrator - to lower the risks associated with electrostatic discharge - corrosion - and thermal breakdown?
Personally owned devices
Continuous monitoring
Time of day restrictions;Access control lists
Temperature and humidity controls
29. The Chief Information Security Officer (CISO) tells the network administrator that a security company has been hired to perform a penetration test against their network. The security company asks the CISO which type of testing would be most beneficia
Impersonation
NIPS
The security company is provided with no information about the corporate network or physical locations.
Power levels
30. Which of the following techniques floods an application with data in an attempt to find vulnerabilities?
War chalking
Fuzzing
Separation of duties
Proxy server
31. Which of the following is BEST described by a scenario where organizational management chooses to implement an internal Incident Response Structure for the business?
UDP 53
Gray box
Continuous monitoring
Mitigation
32. River Tam - a security analyst - discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. Which of the following techniques did River Tam use?
Separation of duties
MD5 checksum
Mitigation
Passive finger printing
33. Which of the following ports would be blocked if Mal - a security administrator - wants to disable FTP?
21
Error handling
Succession planning
Cross-site scripting
34. Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?
Penetration testing
Cable locks
Dictionary; Brute force
E-discovery
35. Which of the following is the purpose of the spanning tree protocol?
Loop protection
SSH
Logic bomb
Group based privileges
36. Which of the following activities should be completed in order to detect anomalies on a network?
Enforced acceptable usage policy - encryption of confidential emails - and monitoring of communications leaving the organization.
GSM phone card and PIN
Log reviews
Signature based
37. Which of the following security tools can Starbuck - a security administrator - use to deter theft?
Rootkit
Cable locks
Worm outbreak
Trust model
38. Which of the following has a default port of 22?
SSH
TPM
Anti-spam
Impersonation
39. Mal - a security administrator - wants to secure remote telnet services and decides to use the services over SSH. Which of the following ports should Mal allow on the firewall by default?
Power levels
22
Signature based
WPA2-Enterprise
40. Traffic has stopped flowing to and from the company network after the inline IPS hardware failed. Which of the following has occurred?
CRL
Failsafe
Botnets
It is faster to encrypt an individual file.
41. Mal is reporting an excessive amount of junk mail on the network email server. Which of the following would ONLY reduce the amount of unauthorized mail?
Fraggle attack
Spam fitters
Mandatory access control
Power levels
42. The accounting department needs access to network share A to maintain a number of financial reporting documents. The department also needs access to network share B in HR to view payroll documentation for cross-referencing items. River Tam - an admin
Vulnerability scan
PEAP
Accounting should be given read/write access to network share A and read access to network share B. River Tam should be given read access for the specific document on network share A.
SSH
43. Which of the following can Jayne - an administrator - use to ensure the confidentiality of a file when it is being sent over FTP?
Cross-site scripting
PGP
Mandated security configurations have been made to the operating system.
Spam filter
44. Jayne - a security administrator - has noticed that the website and external systems have been subject to many attack attempts. To verify integrity of the website and critical files - Jayne should
Business impact assessment
PEAP
Cipher lock combination and proximity badge
Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
45. When reviewing a digital certificate for accuracy - which of the following would Jayne - a security administrator - focus on to determine who affirms the identity of the certificate owner?
NIPS
CA
Penetration test
MD5 checksum
46. Which of the following allows Mal - a security technician - to prevent email traffic from entering the company servers?
Spam filter
CA
E-discovery
Server-side input validation results in a more secure system than client-side input validation.
47. Mal - a user - is having trouble dialing into the network from their house. The administrator checks the RADIUS server - the switch connected to the server - and finds that the switch lost configuration after a recent power outage. The administrator
E-discovery
UDP 53
Mitigate risk and develop a maintenance plan.
VLAN mismatch is occurring.
48. River Tam - the software security engineer - is trying to detect issues that could lead to buffer overflows or memory leaks in the company software. Which of the following would help River Tam automate this detection?
Rogue access point
Risk avoidance
Fuzzing
Dictionary; Brute force
49. Which of the following would help Mal - an administrator - prevent access to a rogue access point connected to a switch?
MD5 checksum
Establish a MAC limit and age
Protocol analyzers
RBAC
50. Starbuck - a security administrator - wants to prevent users in sales from accessing their servers after 6:00 p.m. - and prevent them from accessing accounting's network at all times. Which of the following should Starbuck implement to accomplish the
Notify security to identify employee's whereabouts.
It is faster to encrypt an individual file.
Memory dump - ARP cache
Time of day restrictions;Access control lists