COMPTIA Review Units 1-6 Practice Exam

COMPTIA Review Units 1-6 Practice Exam

9th - 12th Grade

44 Qs

quiz-placeholder

Similar activities

COMPTIA Review Units 1-6 Practice Exam

COMPTIA Review Units 1-6 Practice Exam

COMPTIA IT 2

COMPTIA IT 2

Itech Quiz

Itech Quiz

Cybersecurity chapter 10

Cybersecurity chapter 10

Understanding Social Engineering

Understanding Social Engineering

COMPTIA Review Units 1-6 Practice Exam

COMPTIA Review Units 1-6 Practice Exam

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Dwight Osborne

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information is being taken from the CEO's computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program.

Which of the following attacks was being used to get Data?

Snooping

Social Engineering

Wiretapping

Dos

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person comes to your department and announces, "Im from the internet provider", but doesn't show any ID. This could be an example of _________. (Fill in the blank).

Social Engineering

Denial of Service

Man-In-The-Middle

replay attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Date destruction can be caused by which of the following

Replay attack

Dumpster Diving

Ransomware

DDos

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a email claiming to be from the CEO, asking you to have the accountant wire money to an off-shore account. This is probably an example of _________. (Fill in the blank)

DDos

executive impersonation

wiretapping

lack of audit trail

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are exchanging emails with someone who appears to be an IT director. The responses to your emails don't make sense. After switching to text messages you discover that you and your IT Director have been communicating with a hacker. The attack method is which of the following?

Man-In-The-Middle

Executive Impersonation

Replay Attack

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While speaking with a Co-Worker concerning a surprise party on a standard phone, you hear a faint click. Later, another co-worker makes a statement that implies knowledge of the party, even though no one else should know about the party yet.

What is most likely the reason?

Phishing

Snooping

Dumpster Diving

Wiretapping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes DDos?

Network Attack from Multiple Computers Shuts down connection

Distributed Disk Operating System

Network attack from one computer shuts down connection

Email Carries a virus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?