
CompTIA Security+ ExamCompass Practice Quiz - Tricky/Hard
Authored by blackpanther300 blackpanther300
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is used in data URL phishing?
Prepending
Typosquatting
Pretexting
Domain hijacking
2.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Which of the following answers can be used to describe characteristics of a cross-site scripting attack? (Select 3 answers)
User's browser executes attacker's script
Exploits the trust a website has in the user's web browser
Website executes attacker's requests
A malicious script is injected into a trusted website
Exploits the trust a user's web browser has in a website
3.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Which of the following fragments of input might indicate an LDAP injection attack attempt? (Select 2 answers)
... AND password = " OR '1' = '1';
administrator)(&))
... <script> malicious script code </script>
search.aspx?name=userName) (zone=*)
... p@$$w0rd</password></user><user><name>attacker</name>
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following fragments of input might indicate an XML injection attack attempt?
... <script> malicious script code </script>
search.aspx?name=userName)(zone=*)
... p@$$w0rd</password></user><user><name>attacker</name>
administrator) (&)) AND password = " OR '1' = '1';
... AND password = " OR '1' = '1';
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:
DLL injection
Buffer overflow
Memory leak
Integer overflow
6.
MULTIPLE SELECT QUESTION
15 mins • 1 pt
Which of the following answers can be used to describe characteristics of a cross-site request forgery attack? (Select 3 answers)
Exploits the trust a user's web browser has in a website
A user is tricked by an attacker into submitting unauthorized web requests
Exploits the trust a website has in the user's web browser
Website executes attacker's requests
User's browser executes attacker's script
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:
CRC
FAR
CER
FRR
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?