CompTIA Network+ N10-008 Chapter 9 - 12

CompTIA Network+ N10-008 Chapter 9 - 12

University

54 Qs

quiz-placeholder

Similar activities

Berpikir Komputasi

Berpikir Komputasi

University

50 Qs

Modules 1-2

Modules 1-2

University

53 Qs

Introduction to Computer

Introduction to Computer

University

50 Qs

NILAI KUIS PERTAMA

NILAI KUIS PERTAMA

University - Professional Development

50 Qs

ict 1-50

ict 1-50

University

50 Qs

ICT 151-200

ICT 151-200

University

50 Qs

SUMATIF AKHIR SEMESTER KELAS VII

SUMATIF AKHIR SEMESTER KELAS VII

7th Grade - University

50 Qs

PHP Basics

PHP Basics

University

54 Qs

CompTIA Network+ N10-008 Chapter 9 - 12

CompTIA Network+ N10-008 Chapter 9 - 12

Assessment

Quiz

Computers

University

Hard

Created by

Christopher Wilson

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

54 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What aspect of security does a keylogger primarily attack?

Confidentiality
Integrity
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of an attack targets a vulnerability you don't even have a way to anticipate?

DDoS
Man-in-the-middle
Spoofing
Zero-day

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

You receive an email about a new feature for an online service you use and click the link for more information. Before you sign in to your account, you notice the URL is wrong: it's actually a different site designed to imitate the real one. What attack were you targeted by?

DoS
Evil twin
Phishing
Spoofing

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of attack is most likely when you're doing sensitive work on your laptop at a coffee shop?

Piggybacking
Shoulder surfing
Smurfing
Tailgating

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A user logs into their computer and is presented with a screen showing a Department of Justice logo indicating the computer has been locked due to the user violating federal law. The screen gives several details of the violation and indicates that the user must pay a fine of $500 within 72 hours or a warrant will be issued for their arrest. The user cannot unlock their system. What type of malware is likely infecting the computer?

Logic bomb
Ransomware
Rootkit
Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Evil twins are most commonly used as part of what kind of attack?

Denial of service
On-path
Phishing
Trojan horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Right after you install an endpoint security suite, it scans your computer and generates a database it can later use to detect any alterations to critical system files. What cryptographic method is it most likely using?

Asymmetric encryption
Certificates
Hashing
Symmetric encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?