Search Header Logo

COMPTIA Review Units 1-6 Practice Exam

Authored by Dwight Osborne

Computers

9th - 12th Grade

Used 1+ times

COMPTIA Review Units 1-6 Practice Exam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information is being taken from the CEO's computer on a regular basis, even though passwords are being changed weekly. After checking the computer, you discover a keylogger program.

Which of the following attacks was being used to get Data?

Snooping

Social Engineering

Wiretapping

Dos

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person comes to your department and announces, "Im from the internet provider", but doesn't show any ID. This could be an example of _________. (Fill in the blank).

Social Engineering

Denial of Service

Man-In-The-Middle

replay attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Date destruction can be caused by which of the following

Replay attack

Dumpster Diving

Ransomware

DDos

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a email claiming to be from the CEO, asking you to have the accountant wire money to an off-shore account. This is probably an example of _________. (Fill in the blank)

DDos

executive impersonation

wiretapping

lack of audit trail

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are exchanging emails with someone who appears to be an IT director. The responses to your emails don't make sense. After switching to text messages you discover that you and your IT Director have been communicating with a hacker. The attack method is which of the following?

Man-In-The-Middle

Executive Impersonation

Replay Attack

Social Engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While speaking with a Co-Worker concerning a surprise party on a standard phone, you hear a faint click. Later, another co-worker makes a statement that implies knowledge of the party, even though no one else should know about the party yet.

What is most likely the reason?

Phishing

Snooping

Dumpster Diving

Wiretapping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes DDos?

Network Attack from Multiple Computers Shuts down connection

Distributed Disk Operating System

Network attack from one computer shuts down connection

Email Carries a virus

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?