Comptia A+ 902 Security Threats And Vulnerabilities!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Explanation

Ransomware is a type of malware that aims to extort money from victims by restricting access to their system or data. Spyware, adware, and Trojan horse are all different types of malware with distinct functionalities.

Submit
Please wait...
About This Quiz
CompTIA A+ 902 Security Threats And Vulnerabilities! - Quiz

Explore key concepts in IT security with a focus on threats and vulnerabilities as outlined in the CompTIA A+ 902 curriculum. Enhance your understanding of how to protect... see moresystems against security breaches and develop skills crucial for IT security professionals. see less

2. What is the term for a social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to?

Explanation

Phishing is a type of social engineering attack that involves sending fraudulent communications that appear to come from a reputable source. Spoofing involves falsifying the sender's information to make it appear as though it is coming from a different source. Hacking involves unauthorized access to a computer system. Social engineering is a broader term that encompasses various manipulation techniques to gain confidential information.

Submit
3. What is the term for phishing scams targeting a specific group of users?

Explanation

Spear phishing is a type of phishing attack that targets a specific group of individuals or organizations, usually with a high level of personalization to increase the chances of success. Whaling, Pharming, and Vishing are also types of cyber attacks, but they do not specifically target a particular group in the same way as spear phishing.

Submit
4. What is an email sent from an unknown source disguised as a known source to the receiver an example of?

Explanation

In the context of cybersecurity, spoofing is the act of disguising communication from an unknown source as being from a known, trusted source. Phishing, malware, and ransomware are different types of cyber threats that involve deceptive tactics to trick users into taking actions that compromise security.

Submit
5. The unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is known as:

Explanation

Social engineering involves psychological manipulation to deceive individuals into divulging confidential information. Phishing, malware, and denial of service are common cyber security threats but do not involve the same manipulation of people for information retrieval.

Submit
6. Which of the following fall(s) into the category of social engineering attacks?

Explanation

Social engineering attacks involve manipulating individuals into divulging confidential information, breaching security protocols, or gaining unauthorized access. Spear phishing, Tailgating, and Shoulder Surfing are examples of such attacks, while Malware, Firewall, and Encryption are not direct forms of social engineering tactics.

Submit
7. In computer security, a situation in which an unauthorized person is able to view another user's display or keyboard to learn their password or other confidential information is known as:

Explanation

Shoulder surfing refers to the act of spying on someone's computer screen or keyboard to obtain sensitive information. Phishing, social engineering, and data breaches are also common methods used by hackers to obtain confidential data, but they do not involve physically observing someone's actions.

Submit
8. What does a zero-day attack exploit?

Explanation

Zero-day attacks take advantage of vulnerabilities that are not known to the software developer or vendor, making them difficult to defend against.

Submit
9. What is a computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker called?

Explanation

A 'Zombie' computer is one that has been infected and is under the control of a remote hijacker. 'Bot', 'Spyware', and 'Phishing' are incorrect as they refer to different types of cyber threats.

Submit
10. What term is used to describe a collection of intermediary compromised systems under control of a hacker?

Explanation

A botnet consists of compromised computers or devices that are under the control of a hacker or group of hackers. These compromised systems are typically used to carry out various malicious activities such as DDoS attacks, spamming, data theft, and more.

Submit
11. An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack.

Explanation

A brute-force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute-force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. The correct answer is 'True' because this type of attack relies on computational power to try all possible combinations until the correct one is found.

Submit
12. Which of the following answers refer(s) to the implementation of best security practices in a corporate environment?
Submit
13. What is tailgating?

Explanation

Tailgating refers to the practice of gaining unauthorized access to restricted areas by closely following another person, typically through a secure door or gate. It is a security risk in many organizations and facilities.

Submit
14. What is the term used to refer to harmful programs that are designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems?

Explanation

Malware is a broad category of harmful software that includes viruses, worms, trojans, ransomware, and more. Spyware, adware, and phishing are specific types of malware that serve different purposes.

Submit
15. Malicious software collecting information about users without their knowledge/consent is known as:

Explanation

Spyware is a type of malicious software that covertly collects personal information about users. Adware is software that displays advertisements on a computer, ransomware encrypts files on a computer and demands payment for their release, and a Trojan horse is a program that appears to be useful or harmless but actually carries out hidden malicious functions.

Submit
16. What is a computer program containing malicious segment that attaches itself to an application program or other executable component called?

Explanation

A virus is a type of malware that self-replicates by inserting its code into other programs. Trojans are malware that pretend to be legitimate but actually have malicious intent. Worms are self-replicating malware, like viruses, but do not need to attach to other programs. Adware is advertising-supported software that display ads to the user.

Submit
17. A standalone malicious computer program that replicates itself over a computer network is known as:

Explanation

A worm is a type of malicious software that can self-replicate and spread independently, unlike viruses that require a host program to replicate. Trojans are malicious programs that disguise themselves as legitimate software. Spyware is software that secretly gathers information about a user's computer activities.

Submit
18. Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is called:

Explanation

A Trojan horse is a type of malware that misleads users of its true intent. Worms replicate themselves to spread to other computers. Spyware collects information without the user's knowledge. Ransomware encrypts files and demands payment for decryption.

Submit
19. What is a collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network known as?

Explanation

A rootkit is specifically designed to hide the presence of certain processes or programs from normal methods of detection. Malware, spyware, and firewalls serve different purposes in cybersecurity.

Submit
20. Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks?

Explanation

SMTP (Simple Mail Transfer Protocol) is commonly targeted in spoofing attacks to send forged emails. HTTP (Hypertext Transfer Protocol) is primarily used for web communication and not typically targeted in spoofing attacks. TCP (Transmission Control Protocol) is a foundational protocol for internet communication but not directly involved in common spoofing attacks. DNS (Domain Name System) is crucial for translating domain names to IP addresses and is not a primary target for spoofing attacks.

Submit
21. Which of the password attacks listed below takes advantage of a predefined list of words?

Explanation

A dictionary attack involves trying to login with a list of common words or passwords, while a brute force attack tries all possible combinations. Phishing attacks involve tricking individuals into giving away sensitive information, and SQL injection attacks target databases.

Submit
22. What term refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

Explanation

A backdoor is a method of bypassing normal authentication processes in a software program, online service, or computer system. It may be undocumented and intentionally created by the software developers for troubleshooting or administrative purposes, but it can also be exploited maliciously by attackers to gain unauthorized access.

Submit
23. What type of security measure is in place when a client is denied access to the network due to an outdated antivirus software?

Explanation

Network Access Control (NAC) is a security solution that enforces security policies on devices attempting to access a network. It can detect if antivirus software is outdated and restrict access based on that.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Malware that restricts access to a computer system by encrypting files...
What is the term for a social engineering technique whereby attackers...
What is the term for phishing scams targeting a specific group of...
What is an email sent from an unknown source disguised as a known...
The unauthorized practice of obtaining confidential information by...
Which of the following fall(s) into the category of social engineering...
In computer security, a situation in which an unauthorized person is...
What does a zero-day attack exploit?
What is a computer that has been compromised by a virus or Trojan...
What term is used to describe a collection of intermediary compromised...
An attack against encrypted data that relies heavily on computing...
Which of the following answers refer(s) to the implementation of best...
What is tailgating?
What is the term used to refer to harmful programs that are designed...
Malicious software collecting information about users without their...
What is a computer program containing malicious segment that attaches...
A standalone malicious computer program that replicates itself over a...
Malicious software performing unwanted and harmful actions in disguise...
What is a collection of software tools used by a hacker in order to...
Which of the answers listed below refers to a network protocol used in...
Which of the password attacks listed below takes advantage of a...
What term refers to an undocumented (and often legitimate) way of...
What type of security measure is in place when a client is denied...
Alert!

Advertisement