
CompTIA Security+ Certification Exam SY0-701 Practice Test 8
Quiz
•
Information Technology (IT)
•
12th Grade
•
Hard
Muhammad Rameez Khan
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following refers to a security vulnerability that allows insertion of malicious code into input fields?
RCE
SQLi
XSS
CSRF
Answer explanation
SQLi, or SQL Injection, is a security vulnerability that allows attackers to insert malicious SQL code into input fields, potentially compromising the database. This makes it the correct choice for the question.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following indicates an SQL injection attack attempt?
DELETE FROM itemDB WHERE itemID = '1';
SELECT * FROM users WHERE userName = 'Alice' AND password = '' OR '1' = '1';
DROP TABLE itemDB;
SELECT * FROM users WHERE email = 'example@example.com' AND password = '';
Answer explanation
The correct choice indicates an SQL injection attempt by using 'OR '1' = '1'', which can bypass authentication. This technique exploits vulnerabilities in SQL queries to manipulate database access.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are characteristics of a cross-site scripting (XSS) attack? (Select 3)
Exploits trust a user's browser has in a website
Malicious script is injected into a trusted website
User's browser executes attacker's script
Website executes attacker's request
Exploits trust a website has in the user
Answer explanation
XSS attacks exploit the trust a user's browser has in a website by injecting malicious scripts into trusted sites. The user's browser then executes these scripts, allowing attackers to manipulate user data or sessions.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following refers to software embedded in a hardware chip?
Firmware
Middleware
Device driver
Machine code
Answer explanation
Firmware refers to the specialized software that is embedded directly into hardware chips, enabling them to perform specific functions. It is distinct from middleware, device drivers, and machine code, which serve different purposes.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a product's lifecycle phase when it's no longer sold or maintained?
EOS
EOF
EOL
EOA
Answer explanation
EOL stands for 'End of Life', which refers to the phase in a product's lifecycle when it is no longer sold or maintained. This distinguishes it from EOS (End of Sale) and EOF (End of Functionality), which have different meanings.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary vulnerability of legacy hardware?
Compatibility issues
Lack of security updates and patches
Worn-out components
Shortage of skilled personnel
Answer explanation
The primary vulnerability of legacy hardware is the lack of security updates and patches, which leaves it exposed to new threats and exploits, making it less secure compared to modern systems.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"VM escape" refers to a technique where a guest OS breaks out and accesses the host machine.
True
False
Answer explanation
True. 'VM escape' is a security vulnerability where a guest operating system can break out of its virtual environment and gain access to the host machine, potentially compromising the host's security.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
MS Excel
Quiz
•
11th Grade - University
20 questions
Managing AV Productions
Quiz
•
9th - 12th Grade
20 questions
De la electrónica a la Nube
Quiz
•
9th - 12th Grade
22 questions
9th Grade IT US
Quiz
•
9th Grade - University
20 questions
Cloud Service Models & Software Process Models
Quiz
•
2nd Grade - University
20 questions
Microsoft Excel Review Part 2
Quiz
•
8th Grade - University
20 questions
Higher Admin Microsoft Word Advanced Features
Quiz
•
8th Grade - University
20 questions
Final - Informatics
Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
4 questions
Activity set 10/24
Lesson
•
6th - 8th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
30 questions
October: Math Fluency: Multiply and Divide
Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
15 questions
Halloween Characters
Quiz
•
7th - 12th Grade
10 questions
Halloween Movies Trivia
Quiz
•
5th Grade - University
14 questions
Halloween Fun
Quiz
•
2nd - 12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
16 questions
Subject pronouns in Spanish
Quiz
•
9th - 12th Grade
14 questions
Model and Solve Linear Equations
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
