CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

12th Grade

40 Qs

quiz-placeholder

Similar activities

Excel Test Practice

Excel Test Practice

9th - 12th Grade

42 Qs

CIB Animate 1 & 2 Test

CIB Animate 1 & 2 Test

9th - 12th Grade

42 Qs

CompTIA Security+ SY0-701 Practice Test 4+5

CompTIA Security+ SY0-701 Practice Test 4+5

12th Grade

41 Qs

BTec DIT Comp3 - Revision

BTec DIT Comp3 - Revision

10th - 12th Grade

40 Qs

CompTIA A+ 220-1101 Practice Test 9+10 By Mr.B

CompTIA A+ 220-1101 Practice Test 9+10 By Mr.B

12th Grade

45 Qs

AP CSP Exam Review

AP CSP Exam Review

9th - 12th Grade

45 Qs

CompTIA A+  220-1102 Practice Test 3+4 By Mr.B

CompTIA A+ 220-1102 Practice Test 3+4 By Mr.B

12th Grade

36 Qs

CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

Assessment

Quiz

Computers

12th Grade

Medium

Created by

blackpanther300 blackpanther300

Used 3+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following answers refer to smishing? (Select 2 answers)

Social engineering technique

E-mail communication

Spam over Internet Telephony (SPIT)

Text messaging

Spam over Internet Messaging (SPIM)

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is a PUP? (Select 3 answers)

A type of computer program not explicitly classified as malware by AV software

An application downloaded and installed with the user's consent (legal app)

A type of computer program explicitly classified as malware by AV applications

An application downloaded and installed without the user's consent

A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

SSL stripping is an example of: (Select 2 answers)

Brute-force attack

Downgrade attack

Watering hole attack

On-path attack

Denial-of-Service (DoS) attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

WTLS

GPS

RFID

WAF

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)

An on-path attack is also known as MITM attack

In an on-path attack, attackers place themselves on the communication route between two devices

In an on-path attack, attackers intercept or modify packets sent between two communicating devices

In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices

In an on-path attack, attackers generated forged packets and inject them in the network

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)

ARP poisoning

On-path attack

MAC spoofing

Replay attack

MAC cloning

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)

Network protocol vulnerabilities (WEP/WPA)

Rogue AP / Evil twin

Default security configurations

Malicious email attachments

Vulnerabilities in network security standards (WPS)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?