CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Professional Development

30 Qs

quiz-placeholder

Similar activities

ಕೊರೋನಾ ರೋಗ ಕುರಿತ ಜಾಗೃತಿ ರಸಪ್ರಶ್ನೆ ಕಾರ್ಯಕ್ರಮ

ಕೊರೋನಾ ರೋಗ ಕುರಿತ ಜಾಗೃತಿ ರಸಪ್ರಶ್ನೆ ಕಾರ್ಯಕ್ರಮ

Professional Development

25 Qs

SBA Final Review

SBA Final Review

9th Grade - Professional Development

25 Qs

Web Application Post-Test Under Cyber Closet Project

Web Application Post-Test Under Cyber Closet Project

Professional Development

25 Qs

Web Pre-Test under Cyber Closet Project

Web Pre-Test under Cyber Closet Project

Professional Development

25 Qs

covid - 19

covid - 19

KG - Professional Development

25 Qs

Revision March 9

Revision March 9

Professional Development

25 Qs

Sécurité DEV - CC1 V1

Sécurité DEV - CC1 V1

Professional Development

25 Qs

AC Tema 7. Cuestionario

AC Tema 7. Cuestionario

Professional Development

30 Qs

CompTIA Security+ (1.1 to 1.2)

CompTIA Security+ (1.1 to 1.2)

Assessment

Quiz

Other, Professional Development, Computers

Professional Development

Medium

Created by

Thura Kyaw

Used 64+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of attack can we use with botnets?

ARP poisoning

DOS

Shoulder surfing

DDOS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password attack that only use a "wordlist" file to attack is called

Bruteforce

Dictionary

Spraying

Rainbow table

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We should not use hashing for our password text files

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once infected, the bot wait for the instruction from where

Network

User

DNS server

C&C server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trying every possible password combination is called

Tailgating attack

Dictionary attack

Brute force attack

Spraying attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many kinds of Logic bombs?

3

2

1

5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a watering hole attack, which source is used as a hostage by the attackers to attack their target.

Third party network

USB flash drive

A restaurant

Target computers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?