CompTIA Security+ SY0-701 Revision Test 1

CompTIA Security+ SY0-701 Revision Test 1

University

50 Qs

quiz-placeholder

Similar activities

C1 _S.Quiz: Intro to Profession

C1 _S.Quiz: Intro to Profession

University

46 Qs

Кәсіби ағылшын 1 - 50

Кәсіби ағылшын 1 - 50

University

50 Qs

Prelim: Project Management

Prelim: Project Management

University

46 Qs

Cybersecurity Concepts Worksheet

Cybersecurity Concepts Worksheet

University

55 Qs

IAS1-FINAL EXAMINATION

IAS1-FINAL EXAMINATION

University

50 Qs

Latihan USP Informatika IX paket 1

Latihan USP Informatika IX paket 1

9th Grade - University

50 Qs

UAS Digital Forensik

UAS Digital Forensik

University

50 Qs

CompTIA Security+ SY0-701 Revision Test 1

CompTIA Security+ SY0-701 Revision Test 1

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Tshepo Mofokeng

Used 2+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is it correct to say that a risk guarantees a system will be breached?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'internal or external' describe in cybersecurity terms?

Where files are stored in the system

The level of access a threat actor has

The amount of internet bandwidth

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during a service disruption attack?

Secure login fails due to expired credentials

Valuable data is copied without permission

A system overheats due to overuse

Malware is removed during backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attack surface includes all points a hacker might try to exploit.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ vector refers to an attack requiring remote access over a network.

Internal

Wireless

Remote network

Local script

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a lure-based vector?

Spreadsheet macros

Command shell

Image file containing malware

Keyboard shortcut

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering can involve tricking someone into helping the attacker.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)