Our experts have gathered these Comptia Security +: Cyber Ops MCQs through research, and we hope that you will be able to see how much knowledge base you have for the subject of Comptia Security +: Cyber Ops by answering these 30 multiple-choice questions.
Get started now by scrolling down!
A. Rootkit
B. Image hashes
C. 21
D. Mandatory access control
A. Clustering
B. Succession planning
C. 23
D. Antenna placement; Power levels
A. Dual-homing a server
B. Software as a Service
C. Install both the private and the public key on the web server.
D. Create file hashes for website and critical system files - and compare the current file hashes to the baseline at regular time intervals.
A. Cold site
B. SSH
C. 21
D. Single point of failure
A. RAS
B. Group based privileges
C. Cipher lock combination and proximity badge
D. Gray box
A. Full disk
B. Cable locks
C. Single point of failure
D. Fuzzing
A. Update the CRL; Deploy OCSP
B. Application hardening
C. Account expiration
D. The DES algorithm is run three consecutive times against the item being encrypted
A. The capacity of a system to resist unauthorized changes to stored information
B. Passive finger printing
C. Business impact assessment
D. IV attack
A. Personal firewall
B. Mandatory access control
C. Something you are
D. NAC
A. IV attack
B. Install both the private and the public key on the web server.
C. Dual-homing a server
D. Public key
A. The system shall require users to authenticate to the system with a combination of a password or PIN and a smartcard
B. Port forwarding
C. Firewall
D. Mandatory access control
A. Loop protection
B. Zero day attack
C. CRL
D. Encrypt all confidential data.
A. Warm site
B. DES;3 DES
C. Penetration testing
D. Worm outbreak
A. Deploy an anti-spam device to protect the network.
B. IPS
C. Device encryption
D. To limit the number of endpoints connected through the same switch port
A. SSH
B. Disable unused ports
C. Blowfish
D. E-discovery
A. Signature based
B. Impersonation
C. Change management
D. Two fish
A. WPA2-Enterprise
B. UDP 53
C. VLAN mismatch is occurring.
D. Signature based
A. Clustering
B. DES;3 DES
C. Update the CRL; Deploy OCSP
D. Loop protection
A. Mandatory access control
B. Two fish
C. Error handling
D. PEAP-MSCHAPv2
A. PII handling
B. Fuzzing
C. Software as a Service
D. Worm outbreak
A. Input validation
B. Humidity controls
C. Dictionary; Brute force
D. Establish a MAC limit and age
A. Time of day restrictions;Access control lists
B. CRL
C. Evil twin
D. Clustering
A. Ticket granting server
B. Passive finger printing
C. Mandatory Access Controls
D. CA
A. Penetration testing
B. Vishing
C. Detective
D. Shoulder surfing
A. Account lockout
B. TACACS+; SSH
C. Antenna placement; Power-level control
D. The DES algorithm is run three consecutive times against the item being encrypted.
A. 23
B. Risk avoidance
C. WPA2-PSK
D. Dcfldd
A. The IDS does not identify a buffer overflow
B. Mandate additional security awareness training for all employees.
C. NTLM
D. Business impact assessment
A. Signature based
B. DES;3 DES
C. The security company is provided with no information about the corporate network or physical locations.
D. Separation of duties
A. Dual-homing a server
B. IV attack
C. 21
D. WPA2-PSK
A. SSH
B. Mitigation
C. Proxy server
D. The system is virtualized