CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

12th Grade

25 Qs

quiz-placeholder

Similar activities

Domain 1 - Network Security

Domain 1 - Network Security

9th Grade - University

20 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Chapter 1 Intro to Cybersecurity Cisco

Chapter 1 Intro to Cybersecurity Cisco

10th Grade - University

25 Qs

Class Test

Class Test

12th Grade

20 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

20 Qs

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

20 Qs

CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Cyber Professor - Mr. B

Used 4+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the answers listed below refers to a security vulnerability that enables inserting malicious code into input fields, such as search bars or login forms, to execute unauthorized commands on a database?

RCE

SQLi

XSS

CSRF

Answer explanation

SQLi, or SQL Injection, is a security vulnerability that allows attackers to insert malicious SQL code into input fields, enabling them to execute unauthorized commands on a database. This makes SQLi the correct answer.

2.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following indicates an SQL injection attack attempt?

DELETE FROM itemDB WHERE itemID = '1';

SELECT * FROM users WHERE userName = 'Alice' AND password = '' OR '1' = '1';

DROP TABLE itemDB;

SELECT * FROM users WHERE email = 'example@example.com' AND password = '';

Answer explanation

The correct choice indicates an SQL injection attempt by using 'OR '1' = '1'', which can bypass authentication. This technique exploits vulnerabilities in SQL queries to manipulate database access.

3.

MULTIPLE SELECT QUESTION

1 min • 4 pts

Which of the answers listed below describe the characteristics of a cross-site scripting attack? (Select 3 answers)

Exploits the trust a user's web browser has in a website

A malicious script is injected into a trusted website

User's browser executes attacker's script

Exploits the trust a website has in the user's web browser

A user is tricked by an attacker into submitting unauthorized web requests

Answer explanation

Cross-site scripting (XSS) attacks exploit the trust a user's browser has in a website by injecting a malicious script into a trusted site, which the browser then executes, allowing attackers to manipulate user data.

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following answers refers to a type of software embedded into a hardware chip?

Firmware

Middleware

Device driver

Machine code

Answer explanation

Firmware is a type of software specifically designed to be embedded into hardware chips, providing low-level control for the device. Unlike middleware or device drivers, firmware operates closely with the hardware.

5.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the terms listed below refers to a situation in which a product or service may no longer receive security patches or other updates, making it more vulnerable to attack?

EOL

ALM

EOS

SDLC

Answer explanation

EOL stands for 'End of Life', indicating that a product or service will no longer receive updates or security patches, increasing its vulnerability to attacks. This makes EOL the correct choice for the question.

6.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

What is the main vulnerability related to legacy hardware?

Compatibility issues

Lack of security updates and patches

Worn-out physical components

Lack of skilled personnel to run it and maintain it

Answer explanation

The main vulnerability of legacy hardware is the lack of security updates and patches, making it susceptible to cyber threats. Without regular updates, these systems cannot defend against new vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

Which of the following answers refers to a virtualization-related vulnerability where virtualized assets allocated to one VM are improperly isolated and can be accessed or compromised by another VM?

Resource reuse

Privilege escalation

Resource exhaustion

Concurrent session usage

Answer explanation

Resource reuse refers to a vulnerability in virtualization where resources allocated to one VM can be accessed by another VM due to improper isolation, leading to potential data breaches or compromises.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?