Comptia Security+ Practice Exam (2)
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Brute Force attack
Spoofing attack
Buffer overflow
Man in the middle attack
SYN flood
Rate this question:
Viruses will permit monitoring of online activities.
Spy ware will permit monitoring of online activities.
Logic bomb will permit monitoring of online activities.
Worms will permit monitoring of online activities.
Rate this question:
Marking of documents
Escorting of guests
Badge security system
Training and awareness
Rate this question:
SMURF
Dictionary
Teardrop
Spamming
Rate this question:
This attack is known as non-repudiation.
This attack is known as TCP/IP hijacking.
This attack is known as denial of service (DoS).
This attack is known as brute force.
Rate this question:
Social engineering
Stealth
Ambush
Multi-prolonged
Rate this question:
Dictionary.
Man in the middle.
DoS (Denial of Service).
Social engineering.
Rate this question:
Logic bomb
Virus
Virus
Worm
Rate this question:
This can be described as a hoax.
This can be described as packet sniffing.
This can be described as phishing.
This can be described as spam.
Rate this question:
Worms are spread via e-mail while Trojan horses are not.
Worms are self replicating while Trojan horses are not.
Worms are a form of malicious code while Trojan horses are not.
There is no difference.
Rate this question:
Hostile code.
Social engineering.
IP (Internet Protocol) spoofing.
Man in the middle attack.
Rate this question:
Halloween attack
Phone tag
Replay attack
Social Engineering
IP Spoofing.
Rate this question:
DDOS makes use of Botnet.
DDOS makes use of Phishing.
DDOS makes use of Adware.
DDOS makes use of Trojan.
Rate this question:
This can be accomplished by viewing the from line of the e-mails.
This can be accomplished by reviewing anti-virus logs on the ex employees computer.
This can be accomplished by replying to the e-mail and checking the destination e-mail address.
This can be accomplished by looking at the source IP address in the SMTP header of the e-mails.
Rate this question:
It is known as a logic bomb.
It is known as a back door.
It is known as a Trojan horse.
It is known as software exploit.
Rate this question:
It is known as a Denial of service (DoS).
It is known as a Buffer overflow.
It is known as a Brute force.
It is known as a Syntax error.
Rate this question:
Check for the file and delete it immediately.
Check for the file, delete it immediately and copy the e-mail to all distribution lists.
Report the contents of the message to the network administrator.
Ignore the message. This is a virus hoax and no action is required
Rate this question:
A worm can be transmitted without user intervention.
A virus can be transmitted without user intervention.
A logic bomb can be transmitted without user intervention.
A Trojan horse can be transmitted without user intervention.
Rate this question:
Trojan programs.
Social engineering.
Sniffing.
Hacking.
Rate this question:
A Worm can be transmitted across computer networks without needing a client to distribute software.
A Virus can be transmitted across computer networks without needing a client to distribute software.
A Logic bomb can be transmitted across computer networks without needing a client to distribute software.
A Trojan horse can be transmitted across computer networks without needing a client to distribute software.
Rate this question:
It can enter a system by means of a logic bomb.
It can enter a system by means of a Trojan horse.
It can enter a system by means of a worm.
It can enter a system by means of an e-mail attachment.
Rate this question:
Nmap is port scanning tool.
Cain & Abel is port scanning tool.
L0phtcrack is port scanning tool.
John the Ripper is port scanning tool.
Rate this question:
Worm
SYN flood
Virus
Trojan Horse
Logic Bomb
Rate this question:
Spyware will replicate independently.
Worm will replicate independently.
Trojan horse will replicate independently.
Virus will replicate independently.
Rate this question:
A Virus does not need human involvement.
A Trojan horse does not need human involvement.
A Logic bomb does not need human involvement.
A Worm does not need human involvement.
Rate this question:
The computer is part of a DDoS attack.
The computer is part of a TCP/IP hijacking.
The computer is part of a spoofing attack.
The computer is part of a man-in-the-middle attack.
Rate this question:
Virus.
Trojan horse.
Logic bomb.
Worm.
Rate this question:
Virus
Logic bomb
Worm
Trojan horse
Rate this question:
A virus
A Trojan horse
A worm
A back door
Rate this question:
DDos
Back Door
Man in the Middle
Spoofing
Rate this question:
CRL
DoS
ACL
MD2
None of the above
Rate this question:
Aliasing
Spoofing
Flooding
Redirecting
None of the Above
Rate this question:
Taking over a legitimate TCP (transmission Control Protocol) connection.
Predicting the TCP (transmission Control Protocol) sequence number.
Identifying the TCP (transmission Control Protocol) port for future exploitation.
Identifying source addresses for malicious use.
None of the Above
Rate this question:
The version field.
The source address field.
The source port field.
The destination address field.
Rate this question:
TCP/IP (Transmission Control Protocol/Internet Protocol) hijacking
IP (Internet Protocol) spoofing
Replay
Man in the middle
Rate this question:
Brute force needs the longest attack time.
Dictionary needs the longest attack time.
Rainbow needs the longest attack time.
Birthday needs the longest attack time.
Rate this question:
Brute force attack.
Key logging
Trojan horse.
Social engineering.
Rate this question:
Education, limit available information and security policy.
Education, firewalls and security policy.
Security policy, firewalls and incident response.
Security policy, system logging and incident response.
Rate this question:
SYN (Synchronize) flood.
Ping of death attack.
Land attack.
Buffer overflow attack.
None of the Above
Rate this question:
Differential cryptanalysis
Differential linear cryptanalysis
Birthday attack
Statistical attack
Rate this question:
This can be accomplished by using SNMP.
This can be accomplished by using SMTP.
This can be accomplished by using CHAP.
This can be accomplished by using DHCP.
Rate this question:
You should make use of Automatic updates.
You should make use of Input validation.
You should make use of Signed applets.
You should make use of Nested loops.
Rate this question:
Investigate the e-mail as a possible hoax with a reputable anti-virus vendor.
Immediately search for and delete the file if discovered.
Broadcast a message to the entire organization to alert users to the presence of a virus.
Locate and download a patch to repair the file.
Rate this question:
It can result in the Buffer overflow attack.
It can result in the Dictionary attack.
It can result in the Birthday attack.
It can result in the Common Gateway Interface (CGI) script attack.
Rate this question:
The malicious code is known as logic bomb.
The malicious code is known as Trojan horse.
The malicious code is known as honeypot.
The malicious code is known as worm.
Rate this question:
Zero-day algorithm is used to detect unknown viruses.
Heuristic analysis is used to detect unknown viruses.
Random scanning is used to detect unknown viruses.
Quarantining is used to detect unknown viruses.
Rate this question:
Man in the middle.
Smurf
Teardrop
SYN (Synchronize)
Rate this question:
SYN Flood.
Distributed Denial of Service.
Man in the Middle attack.
TCP Flood.
None of the Above
Rate this question:
Quiz Review Timeline (Updated): May 2, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Security Plus Questions: Comptia Quiz!
CompTIA Security+ is an entry-level certification that develops network security knowledge. CompTIA certification covers IT concepts, basic IT literacy, and terminology....
Questions:
47 |
Attempts:
252 |
Last updated:
Oct 24, 2024
|
CompTIA Security+ SY0-501 Practice Test 02
CompTIA Security+ SY0-501 Practice Test 02 assesses knowledge on securing network devices, supporting data integrity, non-repudiation, confidentiality, and theft prevention. Ideal...
Questions:
201 |
Attempts:
168 |
Last updated:
May 14, 2024
|
CompTIA Security+ SY0-501 Practice Test 01
This CompTIA Security+ SY0-501 Practice Test assesses key cybersecurity skills, focusing on the confidentiality, integrity, and availability of information systems. It evaluates...
Questions:
75 |
Attempts:
335 |
Last updated:
Aug 19, 2023
|
Quiz On CompTIA Security+ Certification! Trivia Questions
Are you looking for a quiz to help you in preparation for the CompTIA Security+ Certification? If so, the questionnaire below is precisely what you may need to refresh your...
Questions:
20 |
Attempts:
326 |
Last updated:
Mar 20, 2023
|
Comptia Security+ Practice Exam
Comptia Security+ Practice Exam- 1
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time...
Questions:
100 |
Attempts:
234 |
Last updated:
May 28, 2024
|
Comptia Security PLUS Practice Exam
Comptia Security+ Practice Exam- 1Full length Comptia Security+ Practice Exam. Take this exam like the
real exam to see if you are completely prepared for the real...
Questions:
100 |
Attempts:
344 |
Last updated:
Dec 05, 2023
|
Wait!
Here's an interesting quiz for you.