037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

9th Grade

25 Qs

quiz-placeholder

Similar activities

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

Microprocessor

Microprocessor

University

20 Qs

Cloud Computing 04

Cloud Computing 04

University

20 Qs

UKK TKJ 2022-P2

UKK TKJ 2022-P2

12th Grade

20 Qs

Quiz Visual Studio

Quiz Visual Studio

12th Grade

20 Qs

EMPOWERMENT ONLINE QUIZ BEE 2

EMPOWERMENT ONLINE QUIZ BEE 2

11th Grade

20 Qs

Basics of Java

Basics of Java

University - Professional Development

20 Qs

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

037_Misconfiguration Vulnerabilities – CompTIA Security+

037_Misconfiguration Vulnerabilities – CompTIA Security+

Assessment

Quiz

Computers

9th Grade

Practice Problem

Easy

Created by

Grit and Motivation

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What common cloud service was involved in the 2017 Verizon data leak?

Amazon S3

Google Cloud Storage

Dropbox

Azure Blob Storage

iCloud

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are administrator accounts high-value targets for attackers?

They provide elevated access to critical system functions

They are always online

They are immune to brute-force attacks

They use two-factor authentication by default

They contain no sensitive information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What password is considered weak and commonly exploited?

123456

Pa$$w0rd!

L0g1nS3cur3

QwErTyUiOp

S3cur3Adm1n

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best practice regarding the root account in Linux?

Disable direct login and use sudo instead

Allow full-time access for convenience

Rename the root account

Store the root password in a shared document

Enable root login over Telnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major risk of using Telnet over SSH?

Telnet sends data in plaintext

Telnet encrypts traffic but not credentials

Telnet compresses traffic, making it unreadable

SSH cannot be used for administrative tasks

Telnet is limited to wireless networks only

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is commonly used to capture network packets?

Wireshark

Nmap

Nessus

Metasploit

SNORT

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data can Wireshark capture from unsecured protocols?

Passwords and cookies

Encrypted VPN traffic

Binary executable code

MAC addresses only

Voice call data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?