037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade

25 Qs

quiz-placeholder

Similar activities

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

Keyboard Quiz

Keyboard Quiz

9th Grade

20 Qs

Internet

Internet

10th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

Tata Letak HTML

Tata Letak HTML

10th Grade

20 Qs

FTP Server

FTP Server

11th Grade

20 Qs

asj materi kontrol dan monitoring jaringan

asj materi kontrol dan monitoring jaringan

12th Grade

20 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

Assessment

Quiz

Computers

9th Grade

Practice Problem

Easy

Created by

Grit and Motivation

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What common cloud service was involved in the 2017 Verizon data leak?

Amazon S3

Google Cloud Storage

Dropbox

Azure Blob Storage

iCloud

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are administrator accounts high-value targets for attackers?

They provide elevated access to critical system functions

They are always online

They are immune to brute-force attacks

They use two-factor authentication by default

They contain no sensitive information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What password is considered weak and commonly exploited?

123456

Pa$$w0rd!

L0g1nS3cur3

QwErTyUiOp

S3cur3Adm1n

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice regarding the root account in Linux?

Disable direct login and use sudo instead

Allow full-time access for convenience

Rename the root account

Store the root password in a shared document

Enable root login over Telnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major risk of using Telnet over SSH?

Telnet sends data in plaintext

Telnet encrypts traffic but not credentials

Telnet compresses traffic, making it unreadable

SSH cannot be used for administrative tasks

Telnet is limited to wireless networks only

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is commonly used to capture network packets?

Wireshark

Nmap

Nessus

Metasploit

SNORT

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data can Wireshark capture from unsecured protocols?

Passwords and cookies

Encrypted VPN traffic

Binary executable code

MAC addresses only

Voice call data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?