037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade

25 Qs

quiz-placeholder

Similar activities

Networking Ports and Protocols

Networking Ports and Protocols

University

20 Qs

Network Port Numbers

Network Port Numbers

University

20 Qs

Network ports

Network ports

1st Grade - University

20 Qs

Ujian Tengah Semester Genap

Ujian Tengah Semester Genap

11th Grade

25 Qs

SRWE Modules 1-3 Review

SRWE Modules 1-3 Review

11th Grade

20 Qs

Cisco Quiz # 1

Cisco Quiz # 1

12th Grade

20 Qs

Pengantar Mikrotik

Pengantar Mikrotik

University

20 Qs

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Grit and Motivation

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What common cloud service was involved in the 2017 Verizon data leak?

Amazon S3

Google Cloud Storage

Dropbox

Azure Blob Storage

iCloud

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are administrator accounts high-value targets for attackers?

They provide elevated access to critical system functions

They are always online

They are immune to brute-force attacks

They use two-factor authentication by default

They contain no sensitive information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What password is considered weak and commonly exploited?

123456

Pa$$w0rd!

L0g1nS3cur3

QwErTyUiOp

S3cur3Adm1n

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice regarding the root account in Linux?

Disable direct login and use sudo instead

Allow full-time access for convenience

Rename the root account

Store the root password in a shared document

Enable root login over Telnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major risk of using Telnet over SSH?

Telnet sends data in plaintext

Telnet encrypts traffic but not credentials

Telnet compresses traffic, making it unreadable

SSH cannot be used for administrative tasks

Telnet is limited to wireless networks only

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is commonly used to capture network packets?

Wireshark

Nmap

Nessus

Metasploit

SNORT

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data can Wireshark capture from unsecured protocols?

Passwords and cookies

Encrypted VPN traffic

Binary executable code

MAC addresses only

Voice call data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?