CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

Quiz
•
Computers
•
12th Grade
•
Medium
blackpanther300 blackpanther300
Used 3+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is a PUP? (Select 3 answers)
A type of computer program not explicitly classified as malware by AV software
An application downloaded and installed with the user's consent (legal app)
A type of computer program explicitly classified as malware by AV applications
An application downloaded and installed without the user's consent
A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
SSL stripping is an example of: (Select 2 answers)
Brute-force attack
Downgrade attack
Watering hole attack
On-path attack
Denial-of-Service (DoS) attack
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
WTLS
GPS
RFID
WAF
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM attack
In an on-path attack, attackers place themselves on the communication route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices
In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
In an on-path attack, attackers generated forged packets and inject them in the network
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
ARP poisoning
On-path attack
MAC spoofing
Replay attack
MAC cloning
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)
Network protocol vulnerabilities (WEP/WPA)
Rogue AP / Evil twin
Default security configurations
Malicious email attachments
Vulnerabilities in network security standards (WPS)
Create a free account and access millions of resources
Similar Resources on Wayground
45 questions
Photoshop

Quiz
•
9th - 12th Grade
37 questions
Final Quiz

Quiz
•
12th Grade
45 questions
Microsoft Excel - Basics

Quiz
•
7th Grade - University
40 questions
Creating a Secure System (5.8 - 5.11)

Quiz
•
9th - 12th Grade
37 questions
Photoshop Domain 4 Quiz

Quiz
•
9th - 12th Grade
45 questions
Cybersecurity Quiz

Quiz
•
12th Grade
36 questions
VEX EXP Spiral Review Test

Quiz
•
12th Grade
44 questions
CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

Quiz
•
12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade