Search Header Logo

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

Authored by blackpanther300 blackpanther300

Computers

12th Grade

Used 3+ times

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is used in data URL phishing?

Prepending

Typosquatting

Pretexting

Domain hijacking

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following answers can be used to describe characteristics of a cross-site scripting attack? (Select 3 answers)

User's browser executes attacker's script

Exploits the trust a website has in the user's web browser

Website executes attacker's requests

A malicious script is injected into a trusted website

Exploits the trust a user's web browser has in a website

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)

... AND password = " OR '1' = '1';

administrator)(&))

... <script> malicious script code </script>

search.aspx?name=userName) (zone=*)

... p@$$w0rd</password></user><user><name>attacker</name>

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following fragments of input might indicate an XML injection attack attempt?


... <script> malicious script code </script>

search.aspx?name=userName)(zone=*)


... p@$$w0rd</password></user><user><name>attacker</name>

administrator) (&)) AND password = " OR '1' = '1';


... AND password = " OR '1' = '1';

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:

DLL injection

Buffer overflow

Memory leak

Integer overflow

6.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)

Exploits the trust a user's web browser has in a website

A user is tricked by an attacker into submitting unauthorized web requests

Exploits the trust a website has in the user's web browser

Website executes attacker's requests

User's browser executes attacker's script

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:

CRC

FAR

CER

FRR

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?