
Security+ SY0-601 Domain 1: Attacks, Threats, and V5
Quiz
•
Computers
•
Professional Development
•
Medium
Angel Martinez
Used 54+ times
FREE Resource
Enhance your content
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?
Spam
DNS poisoning
SYN flood
ARP poisoning
2.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed.
Which type of attack has likely occurred?
Spoofing
Hijacking
Man-in-the-middle
DNS poisoning
3.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information.
Which kind of exploit has been used in this scenario?
Domain name kiting
Man-in-the-middle
DNS poisoning
Reconnaissance
4.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
Replay
Backdoor
Spamming
DDoS
5.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following is the BEST definition of the term hacker?
A general term used to describe any individual who uses their technical knowledge to gain unauthorized access to an organization.
A threat actor whose main goal is financial gain.
The most organized, well-funded, and dangerous type of threat actor.
Any individual whose attacks are politically motivated.
A threat actor who lacks skills and sophistication but wants to impress their friends or garner attention.
6.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following is the correct definition of a threat?
Any potential danger to the confidentiality, integrity, or availability of information or systems
Instance of exposure to losses from an attacker
The likelihood of an attack taking advantage of a vulnerability
Absence or weakness of a safeguard that could be exploited
7.
MULTIPLE CHOICE QUESTION
1 min • 5 pts
Which of the following BEST describes a cyber terrorist?
Desires some kind of financial reward or revenge
Exploits internal vulnerabilities to steal information
Disrupts network-dependent institutions
Downloads and runs attacks available on the internet
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
CySa+ PT 4: 2/3
Quiz
•
9th Grade - Professio...
17 questions
A+ - 10B - Configure Windows System Settings
Quiz
•
Professional Development
21 questions
Computer knowledge (for Essential Digital Skills Entry 3 UK)
Quiz
•
Professional Development
15 questions
Sec+ Quiz - 2
Quiz
•
Professional Development
15 questions
Cybersecurity Triage
Quiz
•
Professional Development
25 questions
security+ (601)
Quiz
•
9th Grade - Professio...
15 questions
DECI - Week 4 - round
Quiz
•
Professional Development
17 questions
Cyber Quiz
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade