
COMPTIA Review Units 1-6 Practice Exam
Authored by Dwight Osborne
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Information is being taken from the CEO's computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program.
Which of the following attacks was being used to get Data?
Snooping
Social Engineering
Wiretapping
Dos
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A person comes to your department and announces, "Im from the internet provider", but doesn't show any ID. This could be an example of _________. (Fill in the blank).
Social Engineering
Denial of Service
Man-In-The-Middle
replay attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Date destruction can be caused by which of the following
Replay attack
Dumpster Diving
Ransomware
DDos
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You receive a email claiming to be from the CEO, asking you to have the accountant wire money to an off-shore account. This is probably an example of _________. (Fill in the blank)
DDos
executive impersonation
wiretapping
lack of audit trail
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are exchanging emails with someone who appears to be an IT director. The responses to your emails don't make sense. After switching to text messages you discover that you and your IT Director have been communicating with a hacker. The attack method is which of the following?
Man-In-The-Middle
Executive Impersonation
Replay Attack
Social Engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While speaking with a Co-Worker concerning a surprise party on a standard phone, you hear a faint click. Later, another co-worker makes a statement that implies knowledge of the party, even though no one else should know about the party yet.
What is most likely the reason?
Phishing
Snooping
Dumpster Diving
Wiretapping
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes DDos?
Network Attack from Multiple Computers Shuts down connection
Distributed Disk Operating System
Network attack from one computer shuts down connection
Email Carries a virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?