CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes

Quiz
•
Computers
•
12th Grade
•
Medium
blackpanther300 blackpanther300
Used 3+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is a PUP? (Select 3 answers)
A type of computer program not explicitly classified as malware by AV software
An application downloaded and installed with the user's consent (legal app)
A type of computer program explicitly classified as malware by AV applications
An application downloaded and installed without the user's consent
A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
SSL stripping is an example of: (Select 2 answers)
Brute-force attack
Downgrade attack
Watering hole attack
On-path attack
Denial-of-Service (DoS) attack
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
WTLS
GPS
RFID
WAF
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM attack
In an on-path attack, attackers place themselves on the communication route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices
In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
In an on-path attack, attackers generated forged packets and inject them in the network
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
ARP poisoning
On-path attack
MAC spoofing
Replay attack
MAC cloning
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)
Network protocol vulnerabilities (WEP/WPA)
Rogue AP / Evil twin
Default security configurations
Malicious email attachments
Vulnerabilities in network security standards (WPS)
Create a free account and access millions of resources
Similar Resources on Wayground
36 questions
Cybersecurity Quiz

Quiz
•
12th Grade
42 questions
IT Fun 1.0 Concepts and Terms

Quiz
•
11th - 12th Grade
39 questions
Domain 1.0 (DD1)

Quiz
•
9th - 12th Grade
44 questions
CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

Quiz
•
12th Grade
40 questions
Creating a Secure System (5.8 - 5.11)

Quiz
•
9th - 12th Grade
45 questions
Cybersecurity Quiz

Quiz
•
12th Grade
45 questions
Troubleshooting Quiz

Quiz
•
9th - 12th Grade
35 questions
HOW COMPUTERS WORK

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade