
CompTIA Security+ ExamCompass Practice Quiz - Silly Mistakes
Authored by blackpanther300 blackpanther300
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer to smishing? (Select 2 answers)
Social engineering technique
E-mail communication
Spam over Internet Telephony (SPIT)
Text messaging
Spam over Internet Messaging (SPIM)
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What is a PUP? (Select 3 answers)
A type of computer program not explicitly classified as malware by AV software
An application downloaded and installed with the user's consent (legal app)
A type of computer program explicitly classified as malware by AV applications
An application downloaded and installed without the user's consent
A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
SSL stripping is an example of: (Select 2 answers)
Brute-force attack
Downgrade attack
Watering hole attack
On-path attack
Denial-of-Service (DoS) attack
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
WTLS
GPS
RFID
WAF
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM attack
In an on-path attack, attackers place themselves on the communication route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices
In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
In an on-path attack, attackers generated forged packets and inject them in the network
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
ARP poisoning
On-path attack
MAC spoofing
Replay attack
MAC cloning
7.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which of the following answers refer(s) to wireless threat vector(s)? (Select all that apply)
Network protocol vulnerabilities (WEP/WPA)
Rogue AP / Evil twin
Default security configurations
Malicious email attachments
Vulnerabilities in network security standards (WPS)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?