
Security+ SY0-601 Domain 1: Attacks, Threats, and V5
Authored by Angel Martinez
Computers
Professional Development
Used 54+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?
Spam
DNS poisoning
SYN flood
ARP poisoning
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed.
Which type of attack has likely occurred?
Spoofing
Hijacking
Man-in-the-middle
DNS poisoning
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information.
Which kind of exploit has been used in this scenario?
Domain name kiting
Man-in-the-middle
DNS poisoning
Reconnaissance
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
Replay
Backdoor
Spamming
DDoS
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following is the BEST definition of the term hacker?
A general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization.
A threat actor whose main goal is financial gain.
The most organized, well-funded, and dangerous type of threat actor.
Any individual whose attacks are politically motivated.
A threat actor who lacks skills and sophistication but wants to impress their friends or garner attention.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following is the correct definition of a threat?
Any potential danger to the confidentiality, integrity, or availability of information or systems
Instance of exposure to losses from an attacker
The likelihood of an attack taking advantage of a vulnerability
Absence or weakness of a safeguard that could be exploited
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following BEST describes a cyber terrorist?
Desires some kind of financial reward or revenge
Exploits internal vulnerabilities to steal information
Disrupts network-dependent institutions
Downloads and runs attacks available on the internet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?