Search Header Logo

CompTIA Network+ N10-008 Chapter 9 - 12

Authored by Christopher Wilson

Computers

University

Used 14+ times

CompTIA Network+ N10-008 Chapter 9 - 12
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

54 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What aspect of security does a keylogger primarily attack?

Confidentiality
Integrity
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of an attack targets a vulnerability you don't even have a way to anticipate?

DDoS
Man-in-the-middle
Spoofing
Zero-day

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You receive an email about a new feature for an online service you use and click the link for more information. Before you sign in to your account, you notice the URL is wrong: it's actually a different site designed to imitate the real one. What attack were you targeted by?

DoS
Evil twin
Phishing
Spoofing

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of attack is most likely when you're doing sensitive work on your laptop at a coffee shop?

Piggybacking
Shoulder surfing
Smurfing
Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A user logs into their computer and is presented with a screen showing a Department of Justice logo indicating the computer has been locked due to the user violating federal law. The screen gives several details of the violation and indicates that the user must pay a fine of $500 within 72 hours or a warrant will be issued for their arrest. The user cannot unlock their system. What type of malware is likely infecting the computer?

Logic bomb
Ransomware
Rootkit
Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Evil twins are most commonly used as part of what kind of attack?

Denial of service
On-path
Phishing
Trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Right after you install an endpoint security suite, it scans your computer and generates a database it can later use to detect any alterations to critical system files. What cryptographic method is it most likely using?

Asymmetric encryption
Certificates
Hashing
Symmetric encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?