CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

12th Grade

44 Qs

quiz-placeholder

Similar activities

LATIHAN SOAL MYOB XI Akuntansi

LATIHAN SOAL MYOB XI Akuntansi

12th Grade

40 Qs

AIJ - XII TKJ

AIJ - XII TKJ

12th Grade

40 Qs

EOPA Web Design

EOPA Web Design

10th - 12th Grade

40 Qs

HTML Practice 2 of 4

HTML Practice 2 of 4

11th - 12th Grade

40 Qs

UTS MAPEL PHOTOGRAPY KELAS XII DKV

UTS MAPEL PHOTOGRAPY KELAS XII DKV

12th Grade

40 Qs

MS Excel Test #1

MS Excel Test #1

9th - 12th Grade

45 Qs

HTML y Conceptos de programación.

HTML y Conceptos de programación.

KG - 12th Grade

43 Qs

Pemograman Web dan Perangkat Bergerak

Pemograman Web dan Perangkat Bergerak

12th Grade

40 Qs

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 3+ times

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is used in data URL phishing?

Prepending

Typosquatting

Pretexting

Domain hijacking

2.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following answers can be used to describe characteristics of a cross-site scripting attack? (Select 3 answers)

User's browser executes attacker's script

Exploits the trust a website has in the user's web browser

Website executes attacker's requests

A malicious script is injected into a trusted website

Exploits the trust a user's web browser has in a website

3.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)

... AND password = " OR '1' = '1';

administrator)(&))

... <script> malicious script code </script>

search.aspx?name=userName) (zone=*)

... p@$$w0rd</password></user><user><name>attacker</name>

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following fragments of input might indicate an XML injection attack attempt?


... <script> malicious script code </script>

search.aspx?name=userName)(zone=*)


... p@$$w0rd</password></user><user><name>attacker</name>

administrator) (&)) AND password = " OR '1' = '1';


... AND password = " OR '1' = '1';

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:

DLL injection

Buffer overflow

Memory leak

Integer overflow

6.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)

Exploits the trust a user's web browser has in a website

A user is tricked by an attacker into submitting unauthorized web requests

Exploits the trust a website has in the user's web browser

Website executes attacker's requests

User's browser executes attacker's script

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:

CRC

FAR

CER

FRR

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?