CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Professional Development

30 Qs

quiz-placeholder

Similar activities

Cyber Crime Investigation

Cyber Crime Investigation

Professional Development

28 Qs

1002 A + Ch 04 & 05 Security Principles & Security Technologies

1002 A + Ch 04 & 05 Security Principles & Security Technologies

Professional Development

33 Qs

Sicurezza nei sistemi informativi

Sicurezza nei sistemi informativi

7th Grade - Professional Development

30 Qs

Secure Use of IT

Secure Use of IT

Professional Development

26 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

25 Qs

Unit II. Security Threats. Автор учебника: Д.В. Записной

Unit II. Security Threats. Автор учебника: Д.В. Записной

Professional Development

35 Qs

Malhub Cybersecurity Quiz 1

Malhub Cybersecurity Quiz 1

Professional Development

35 Qs

Quiz 1 - PROFE5 313 - BSIS 3A

Quiz 1 - PROFE5 313 - BSIS 3A

Professional Development

25 Qs

CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Assessment

Quiz

Other, Professional Development, Computers

Professional Development

Medium

Created by

Thura Kyaw

Used 63+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack can we use with botnets?

ARP poisoning

DOS

Shoulder surfing

DDOS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password attack that only use a "wordlist" file to attack is called

Bruteforce

Dictionary

Spraying

Rainbow table

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We should not use hashing for our password text files

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once infected, the bot wait for the instruction from where

Network

User

DNS server

C&C server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trying every possible password combination is called

Tailgating attack

Dictionary attack

Brute force attack

Spraying attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many kinds of Logic bombs?

3

2

1

5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a watering hole attack, which source is used as a hostage by the attackers to attack their target.

Third party network

USB flash drive

A restaurant

Target computers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?