CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

quiz-placeholder

Similar activities

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Networks LAN and WAN

Networks LAN and WAN

7th - 12th Grade

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Consequences of a cyber security attack

Consequences of a cyber security attack

10th - 12th Grade

15 Qs

Internal Threats

Internal Threats

12th Grade

15 Qs

Unit 11 Topic B2 Network Components

Unit 11 Topic B2 Network Components

12th Grade

10 Qs

Internet of Things

Internet of Things

9th - 12th Grade

10 Qs

TCP/IP Quiz_

TCP/IP Quiz_

9th - 12th Grade

15 Qs

CompTIA Practice Questions

CompTIA Practice Questions

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Jay Thapar

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You were visiting a website but accidentally misspelt the name. You were taken to the same website that you intended to visit. After you exit the website, your system becomes unstable. Which of the following attacks has occurred?

Typosquatting

Spear Phishing

Whaling

Prepending

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Someone has created a Facebook page with your name. The Facebook page contains your information and photos. Which type of social engineering attack has occurred?

Impersonation

Whaling

Identity Theft

Spear Phishing

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following attack reverse a cryptography hash function?

Dictionary Attack

Password Spraying Attack

Brute-force attack

Rainbow table attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attacker inserted a piece of malicious code into a live process. Which of the following type of attack is taking place?

Buffer Overflow

DLL Injection

Privilege Escalation

Replay Attack

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A group of attackers stole sensitive information in an attack. After this attack, you found that they had been in the network for several months during the investigation. Which type of attackers were these?

Advanced Persistent Threat (APTs)

Script Kiddies

Hacktivists

Insider Threats

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You want to name all systems on the network based on their department names. Which of the following should you use for this purpose?

Network Diagram

Baseline Configuration

IP Schema

Standard naming convention

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You want to perform integration testing of the application that you are developing. You also need to measure the application performance. Which of the following environment should you use for this purpose?

Development

Testing

Staging

Production

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?