Security+ Domain 2

Security+ Domain 2

12th Grade

56 Qs

quiz-placeholder

Similar activities

LONG QUIZ 2

LONG QUIZ 2

12th Grade

60 Qs

Angleton JH Intro to Robotics Final Exam

Angleton JH Intro to Robotics Final Exam

6th - 12th Grade

60 Qs

Career Prep Final

Career Prep Final

9th - 12th Grade

58 Qs

QUIZ1 UPS1

QUIZ1 UPS1

12th Grade

56 Qs

Test B

Test B

9th - 12th Grade

55 Qs

#3 CIW Data Analyst - Certification Prep

#3 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

Unit 7 Parameters, Arguments, & Libraries

Unit 7 Parameters, Arguments, & Libraries

9th - 12th Grade

52 Qs

ESS EOC Review Day 4

ESS EOC Review Day 4

10th - 12th Grade

57 Qs

Security+ Domain 2

Security+ Domain 2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Kari Cobb

Used 4+ times

FREE Resource

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Brute force attack

Password sniffing

Keylogger

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following do security templates allow you to do? (Select two.)

Fix a specific software problem

Configure consistent security settings between devices

Apply new software patches

Quickly apply settings to multiple computers

Block malicious websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator suspects an attacker is intercepting and potentially modifying communications between their organization's server and the client systems. The attacker is not detected by either party during this process. Which type of attack is the network administrator likely observing in this instance?

Domain Name System (DNS) attack

Man-in-the-middle attack

Denial of Service (DoS) attack

Phishing attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves overwhelming a service with excessive requests to cause denial of service?

Distributed denial-of-service (DDoS) attack

Replay attack

On-path attack

Phishing attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a virtualized environment, what strategy should a network administrator employ to maintain the integrity and isolation of individual VMs?

Mitigating virtual machine escape

Establishing firewall rules

Implementing network segmentation

Enforcing user access controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of access control should be used to ensure that only specifically authorized users have access to a resource, while all others are denied?

Implicit allow, explicit deny

Explicit allow, implicit deny

Implicit allow, implicit deny

Explicit allow, explicit deny

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following BEST describes sideloading? (Select two.)

It does not undergo the same scrutiny and vetting process as those on official application stores.

It refers to the installation of applications from sources other than the official application store of the platform.

It allows users to install unauthorized applications and customize device appearance and behavior.

It is a method used to gain elevated privileges and access to system files on mobile devices.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?