CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Professional Development

30 Qs

quiz-placeholder

Similar activities

Web Application Post-Test Under Cyber Closet Project

Web Application Post-Test Under Cyber Closet Project

Professional Development

25 Qs

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Professional Development

28 Qs

1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Professional Development

33 Qs

Sécurité - CC3

Sécurité - CC3

Professional Development

34 Qs

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

Security Plus Chapt.1 Pt.1

Security Plus Chapt.1 Pt.1

Professional Development

26 Qs

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

Web Pre-Test under Cyber Closet Project

Web Pre-Test under Cyber Closet Project

Professional Development

25 Qs

CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Assessment

Quiz

Other, Professional Development, Computers

Professional Development

Medium

Created by

Thura Kyaw

Used 64+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack can we use with botnets?

ARP poisoning

DOS

Shoulder surfing

DDOS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password attack that only use a "wordlist" file to attack is called

Bruteforce

Dictionary

Spraying

Rainbow table

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We should not use hashing for our password text files

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once infected, the bot wait for the instruction from where

Network

User

DNS server

C&C server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trying every possible password combination is called

Tailgating attack

Dictionary attack

Brute force attack

Spraying attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many kinds of Logic bombs?

3

2

1

5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a watering hole attack, which source is used as a hostage by the attackers to attack their target.

Third party network

USB flash drive

A restaurant

Target computers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?