Search Header Logo

Security+ Domain 2

Authored by Kari Cobb

Computers

12th Grade

Used 4+ times

Security+ Domain 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Pass-the-hash attack

Brute force attack

Password sniffing

Keylogger

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following do security templates allow you to do? (Select two.)

Fix a specific software problem

Configure consistent security settings between devices

Apply new software patches

Quickly apply settings to multiple computers

Block malicious websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator suspects an attacker is intercepting and potentially modifying communications between their organization's server and the client systems. The attacker is not detected by either party during this process. Which type of attack is the network administrator likely observing in this instance?

Domain Name System (DNS) attack

Man-in-the-middle attack

Denial of Service (DoS) attack

Phishing attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves overwhelming a service with excessive requests to cause denial of service?

Distributed denial-of-service (DDoS) attack

Replay attack

On-path attack

Phishing attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a virtualized environment, what strategy should a network administrator employ to maintain the integrity and isolation of individual VMs?

Mitigating virtual machine escape

Establishing firewall rules

Implementing network segmentation

Enforcing user access controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method of access control should be used to ensure that only specifically authorized users have access to a resource, while all others are denied?

Implicit allow, explicit deny

Explicit allow, implicit deny

Implicit allow, implicit deny

Explicit allow, explicit deny

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following BEST describes sideloading? (Select two.)

It does not undergo the same scrutiny and vetting process as those on official application stores.

It refers to the installation of applications from sources other than the official application store of the platform.

It allows users to install unauthorized applications and customize device appearance and behavior.

It is a method used to gain elevated privileges and access to system files on mobile devices.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?