
Security+ Domain 2
Authored by Kari Cobb
Computers
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
56 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Brute force attack
Password sniffing
Keylogger
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following do security templates allow you to do? (Select two.)
Fix a specific software problem
Configure consistent security settings between devices
Apply new software patches
Quickly apply settings to multiple computers
Block malicious websites
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator suspects an attacker is intercepting and potentially modifying communications between their organization's server and the client systems. The attacker is not detected by either party during this process. Which type of attack is the network administrator likely observing in this instance?
Domain Name System (DNS) attack
Man-in-the-middle attack
Denial of Service (DoS) attack
Phishing attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves overwhelming a service with excessive requests to cause denial of service?
Distributed denial-of-service (DDoS) attack
Replay attack
On-path attack
Phishing attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a virtualized environment, what strategy should a network administrator employ to maintain the integrity and isolation of individual VMs?
Mitigating virtual machine escape
Establishing firewall rules
Implementing network segmentation
Enforcing user access controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method of access control should be used to ensure that only specifically authorized users have access to a resource, while all others are denied?
Implicit allow, explicit deny
Explicit allow, implicit deny
Implicit allow, implicit deny
Explicit allow, explicit deny
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following BEST describes sideloading? (Select two.)
It does not undergo the same scrutiny and vetting process as those on official application stores.
It refers to the installation of applications from sources other than the official application store of the platform.
It allows users to install unauthorized applications and customize device appearance and behavior.
It is a method used to gain elevated privileges and access to system files on mobile devices.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
55 questions
AutoCAD Certification Quizziz
Quiz
•
9th - 12th Grade
55 questions
HTML Basics
Quiz
•
11th - 12th Grade
58 questions
Building Materials
Quiz
•
10th - 12th Grade
56 questions
CompTia 1001 Exam Review
Quiz
•
10th Grade - University
55 questions
AIJ Firewall Proxy Mikrotik - PAS
Quiz
•
12th Grade
51 questions
ÔN TẬP GIỮA HỌC KỲ II - LỚP 11
Quiz
•
12th Grade
56 questions
GRADE 8 4TH MONTHLY EXAM- COMPUTER 8
Quiz
•
8th Grade - University
55 questions
DDPTJKT - Penilaian Individual
Quiz
•
4th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade