CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

quiz-placeholder

Similar activities

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Network Devices

Network Devices

12th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

The Internet

The Internet

9th - 12th Grade

6 Qs

Internet Vocabulary Notebook Check #2 - CTEA

Internet Vocabulary Notebook Check #2 - CTEA

12th Grade

11 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Communication & Networking - Client Server & Peer to Peer

Communication & Networking - Client Server & Peer to Peer

2nd - 12th Grade

10 Qs

Security Controls

Security Controls

12th Grade

10 Qs

CompTIA Practice Questions

CompTIA Practice Questions

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Jay Thapar

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You were visiting a website but accidentally misspelt the name. You were taken to the same website that you intended to visit. After you exit the website, your system becomes unstable. Which of the following attacks has occurred?

Typosquatting

Spear Phishing

Whaling

Prepending

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Someone has created a Facebook page with your name. The Facebook page contains your information and photos. Which type of social engineering attack has occurred?

Impersonation

Whaling

Identity Theft

Spear Phishing

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following attack reverse a cryptography hash function?

Dictionary Attack

Password Spraying Attack

Brute-force attack

Rainbow table attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An attacker inserted a piece of malicious code into a live process. Which of the following type of attack is taking place?

Buffer Overflow

DLL Injection

Privilege Escalation

Replay Attack

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A group of attackers stole sensitive information in an attack. After this attack, you found that they had been in the network for several months during the investigation. Which type of attackers were these?

Advanced Persistent Threat (APTs)

Script Kiddies

Hacktivists

Insider Threats

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You want to name all systems on the network based on their department names. Which of the following should you use for this purpose?

Network Diagram

Baseline Configuration

IP Schema

Standard naming convention

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You want to perform integration testing of the application that you are developing. You also need to measure the application performance. Which of the following environment should you use for this purpose?

Development

Testing

Staging

Production

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?