Which of the following answers refer to smishing? (Select 2 answers)
CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

Quiz
•
Computers
•
12th Grade
•
Medium
blackpanther300 blackpanther300
Used 3+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is a PUP? (Select 3 answers)
A type of computer program not explicitly classified as malware by AV software
An application downloaded and installed with the user's consent (legal app)
A type of computer program explicitly classified as malware by AV applications
An application downloaded and installed without the user's consent
A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
SSL stripping is an example of: (Select 2 answers)
Brute-force attack
Downgrade attack
Watering hole attack
On-path attack
Denial-of-Service (DoS) attack
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
WTLS
GPS
RFID
WAF
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM attack
In an on-path attack, attackers place themselves on the communication route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices
In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
In an on-path attack, attackers generated forged packets and inject them in the network
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
ARP poisoning
On-path attack
MAC spoofing
Replay attack
MAC cloning
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)
Network protocol vulnerabilities (WEP/WPA)
Rogue AP / Evil twin
Default security configurations
Malicious email attachments
Vulnerabilities in network security standards (WPS)
Create a free account and access millions of resources
Similar Resources on Quizizz
35 questions
Wireless Network Review

Quiz
•
11th Grade - University
35 questions
98-367 PT3

Quiz
•
9th - 12th Grade
35 questions
Photoshop ACA

Quiz
•
9th - 12th Grade
37 questions
IC3 GS6 Domain 1 Assessment

Quiz
•
6th - 12th Grade
40 questions
Introduction to Microsoft Word

Quiz
•
8th - 12th Grade
39 questions
Module 6 Questions

Quiz
•
12th Grade
37 questions
Excel Gmetrix Quiz

Quiz
•
10th - 12th Grade
36 questions
Data and Database: SQL

Quiz
•
11th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University