
Security+ Domain 2

Quiz
•
Computers
•
12th Grade
•
Medium
Kari Cobb
Used 4+ times
FREE Resource
56 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a password attack that tests every possible keystroke for every single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Pass-the-hash attack
Brute force attack
Password sniffing
Keylogger
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following do security templates allow you to do? (Select two.)
Fix a specific software problem
Configure consistent security settings between devices
Apply new software patches
Quickly apply settings to multiple computers
Block malicious websites
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator suspects an attacker is intercepting and potentially modifying communications between their organization's server and the client systems. The attacker is not detected by either party during this process. Which type of attack is the network administrator likely observing in this instance?
Domain Name System (DNS) attack
Man-in-the-middle attack
Denial of Service (DoS) attack
Phishing attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves overwhelming a service with excessive requests to cause denial of service?
Distributed denial-of-service (DDoS) attack
Replay attack
On-path attack
Phishing attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a virtualized environment, what strategy should a network administrator employ to maintain the integrity and isolation of individual VMs?
Mitigating virtual machine escape
Establishing firewall rules
Implementing network segmentation
Enforcing user access controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method of access control should be used to ensure that only specifically authorized users have access to a resource, while all others are denied?
Implicit allow, explicit deny
Explicit allow, implicit deny
Implicit allow, implicit deny
Explicit allow, explicit deny
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following BEST describes sideloading? (Select two.)
It does not undergo the same scrutiny and vetting process as those on official application stores.
It refers to the installation of applications from sources other than the official application store of the platform.
It allows users to install unauthorized applications and customize device appearance and behavior.
It is a method used to gain elevated privileges and access to system files on mobile devices.
Create a free account and access millions of resources
Similar Resources on Wayground
61 questions
Website Optimisation Guide

Quiz
•
12th Grade
54 questions
Unit 4 Study Guide

Quiz
•
9th Grade - University
60 questions
23-24 Cybersecurity II S1 Exam Review By Mr B

Quiz
•
12th Grade
53 questions
Scratch Programming

Quiz
•
9th Grade - University
55 questions
Exploring Computer Science Unit 1 Review

Quiz
•
9th - 12th Grade
51 questions
ALGORITHM AND FLOWCHART

Quiz
•
12th Grade - University
57 questions
EOP Employability/Academic Prep

Quiz
•
9th - 12th Grade
53 questions
R050 Topics Quiz

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade