CompTIA Security+ SY0-701 Revision Test 1

CompTIA Security+ SY0-701 Revision Test 1

University

50 Qs

quiz-placeholder

Similar activities

Network Analysis Quiz

Network Analysis Quiz

University

49 Qs

BSIT2102 PL Networking1 Tuando

BSIT2102 PL Networking1 Tuando

University

50 Qs

Midterm GEE-LIE

Midterm GEE-LIE

University

50 Qs

SAS GANJIL INFORMATIKA KELAS 7 TAHUN 2024-2025

SAS GANJIL INFORMATIKA KELAS 7 TAHUN 2024-2025

7th Grade - University

45 Qs

Latihan USP Informatika IX paket 1

Latihan USP Informatika IX paket 1

9th Grade - University

50 Qs

Java қазақша 1 - 50

Java қазақша 1 - 50

University

50 Qs

Digital Citizenship and ICT Quiz

Digital Citizenship and ICT Quiz

8th Grade - University

49 Qs

Java қазақша 201 - 250

Java қазақша 201 - 250

University

50 Qs

CompTIA Security+ SY0-701 Revision Test 1

CompTIA Security+ SY0-701 Revision Test 1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Tshepo Mofokeng

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is it correct to say that a risk guarantees a system will be breached?

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'internal or external' describe in cybersecurity terms?

Where files are stored in the system

The level of access a threat actor has

The amount of internet bandwidth

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens during a service disruption attack?

Secure login fails due to expired credentials

Valuable data is copied without permission

A system overheats due to overuse

Malware is removed during backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attack surface includes all points a hacker might try to exploit.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ vector refers to an attack requiring remote access over a network.

Internal

Wireless

Remote network

Local script

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a lure-based vector?

Spreadsheet macros

Command shell

Image file containing malware

Keyboard shortcut

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social engineering can involve tricking someone into helping the attacker.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?