Search Header Logo

Security+ SY0-601 Domain 1: Attacks, Threats, and V5

Authored by Angel Martinez

Computers

Professional Development

Used 54+ times

Security+ SY0-601 Domain 1: Attacks, Threats, and V5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?

Spam

DNS poisoning

SYN flood

ARP poisoning

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed.

Which type of attack has likely occurred?

Spoofing

Hijacking

Man-in-the-middle

DNS poisoning

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information.

Which kind of exploit has been used in this scenario?

Domain name kiting

Man-in-the-middle

DNS poisoning

Reconnaissance

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?

Replay

Backdoor

Spamming

DDoS

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following is the BEST definition of the term hacker?

A general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization.

A threat actor whose main goal is financial gain.

The most organized, well-funded, and dangerous type of threat actor.

Any individual whose attacks are politically motivated.

A threat actor who lacks skills and sophistication but wants to impress their friends or garner attention.

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following is the correct definition of a threat?

Any potential danger to the confidentiality, integrity, or availability of information or systems

Instance of exposure to losses from an attacker

The likelihood of an attack taking advantage of a vulnerability

Absence or weakness of a safeguard that could be exploited

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Which of the following BEST describes a cyber terrorist?

Desires some kind of financial reward or revenge

Exploits internal vulnerabilities to steal information

Disrupts network-dependent institutions

Downloads and runs attacks available on the internet

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?