Search Header Logo

CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

Authored by blackpanther300 blackpanther300

Computers

12th Grade

Used 3+ times

CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following answers refer to smishing? (Select 2 answers)

Social engineering technique

E-mail communication

Spam over Internet Telephony (SPIT)

Text messaging

Spam over Internet Messaging (SPIM)

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is a PUP? (Select 3 answers)

A type of computer program not explicitly classified as malware by AV software

An application downloaded and installed with the user's consent (legal app)

A type of computer program explicitly classified as malware by AV applications

An application downloaded and installed without the user's consent

A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

SSL stripping is an example of: (Select 2 answers)

Brute-force attack

Downgrade attack

Watering hole attack

On-path attack

Denial-of-Service (DoS) attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

WTLS

GPS

RFID

WAF

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)

An on-path attack is also known as MITM attack

In an on-path attack, attackers place themselves on the communication route between two devices

In an on-path attack, attackers intercept or modify packets sent between two communicating devices

In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices

In an on-path attack, attackers generated forged packets and inject them in the network

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)

ARP poisoning

On-path attack

MAC spoofing

Replay attack

MAC cloning

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)

Network protocol vulnerabilities (WEP/WPA)

Rogue AP / Evil twin

Default security configurations

Malicious email attachments

Vulnerabilities in network security standards (WPS)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?