
Security+ Domain 2
Authored by Kari Cobb
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Brute force attack
Password sniffing
Keylogger
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following do security templates allow you to do? (Select two.)
Fix a specific software problem
Configure consistent security settings between devices
Apply new software patches
Quickly apply settings to multiple computers
Block malicious websites
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator suspects an attacker is intercepting and potentially modifying communications between their organization's server and the client systems. The attacker is not detected by either party during this process. Which type of attack is the network administrator likely observing in this instance?
Domain Name System (DNS) attack
Man-in-the-middle attack
Denial of Service (DoS) attack
Phishing attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves overwhelming a service with excessive requests to cause denial of service?
Distributed denial-of-service (DDoS) attack
Replay attack
On-path attack
Phishing attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a virtualized environment, what strategy should a network administrator employ to maintain the integrity and isolation of individual VMs?
Mitigating virtual machine escape
Establishing firewall rules
Implementing network segmentation
Enforcing user access controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method of access control should be used to ensure that only specifically authorized users have access to a resource, while all others are denied?
Implicit allow, explicit deny
Explicit allow, implicit deny
Implicit allow, implicit deny
Explicit allow, explicit deny
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following BEST describes sideloading? (Select two.)
It does not undergo the same scrutiny and vetting process as those on official application stores.
It refers to the installation of applications from sources other than the official application store of the platform.
It allows users to install unauthorized applications and customize device appearance and behavior.
It is a method used to gain elevated privileges and access to system files on mobile devices.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?