Comptia Security+ Practice Exam (2)
Full length Comptia Security+ Practice Exam. Take this exam like the real exam to see if you are completely prepared for the real exam. Time yourself to 90 minutes to get a feel of the pressures of the real exam. The practice test is designed to reflect the final exam.
Social engineering
Stealth
Ambush
Multi-prolonged
Rate this question:
Marking of documents
Escorting of guests
Badge security system
Training and awareness
Rate this question:
DDOS makes use of Botnet.
DDOS makes use of Phishing.
DDOS makes use of Adware.
DDOS makes use of Trojan.
Rate this question:
This attack is known as non-repudiation.
This attack is known as TCP/IP hijacking.
This attack is known as denial of service (DoS).
This attack is known as brute force.
Rate this question:
Viruses will permit monitoring of online activities.
Spy ware will permit monitoring of online activities.
Logic bomb will permit monitoring of online activities.
Worms will permit monitoring of online activities.
Rate this question:
Virus
Logic bomb
Worm
Trojan horse
Rate this question:
A virus
A Trojan horse
A worm
A back door
Rate this question:
Trojan programs.
Social engineering.
Sniffing.
Hacking.
Rate this question:
Strong passwords are not required
Lack of security awareness
Multiple logins are allowed
Audit logs are not monitored frequently
Rate this question:
SMURF
Dictionary
Teardrop
Spamming
Rate this question:
It is known as a Denial of service (DoS).
It is known as a Buffer overflow.
It is known as a Brute force.
It is known as a Syntax error.
Rate this question:
This can be described as a hoax.
This can be described as packet sniffing.
This can be described as phishing.
This can be described as spam.
Rate this question:
Halloween attack
Phone tag
Replay attack
Social Engineering
IP Spoofing.
Rate this question:
CRL
DoS
ACL
MD2
None of the above
Rate this question:
TCP/IP (Transmission Control Protocol/Internet Protocol) hijacking
IP (Internet Protocol) spoofing
Replay
Man in the middle
Rate this question:
A Virus does not need human involvement.
A Trojan horse does not need human involvement.
A Logic bomb does not need human involvement.
A Worm does not need human involvement.
Rate this question:
Dictionary.
Man in the middle.
DoS (Denial of Service).
Social engineering.
Rate this question:
Logic bomb
Virus
Virus
Worm
Rate this question:
Worm
SYN flood
Virus
Trojan Horse
Logic Bomb
Rate this question:
Spyware will replicate independently.
Worm will replicate independently.
Trojan horse will replicate independently.
Virus will replicate independently.
Rate this question:
Brute force attack.
Key logging
Trojan horse.
Social engineering.
Rate this question:
Taking over a legitimate TCP (transmission Control Protocol) connection.
Predicting the TCP (transmission Control Protocol) sequence number.
Identifying the TCP (transmission Control Protocol) port for future exploitation.
Identifying source addresses for malicious use.
None of the Above
Rate this question:
The version field.
The source address field.
The source port field.
The destination address field.
Rate this question:
Nmap is port scanning tool.
Cain & Abel is port scanning tool.
L0phtcrack is port scanning tool.
John the Ripper is port scanning tool.
Rate this question:
The computer is part of a DDoS attack.
The computer is part of a TCP/IP hijacking.
The computer is part of a spoofing attack.
The computer is part of a man-in-the-middle attack.
Rate this question:
Worms are spread via e-mail while Trojan horses are not.
Worms are self replicating while Trojan horses are not.
Worms are a form of malicious code while Trojan horses are not.
There is no difference.
Rate this question:
Virus.
Trojan horse.
Logic bomb.
Worm.
Rate this question:
Education, limit available information and security policy.
Education, firewalls and security policy.
Security policy, firewalls and incident response.
Security policy, system logging and incident response.
Rate this question:
Man in the middle.
Smurf
Teardrop
SYN (Synchronize)
Rate this question:
It can enter a system by means of a logic bomb.
It can enter a system by means of a Trojan horse.
It can enter a system by means of a worm.
It can enter a system by means of an e-mail attachment.
Rate this question:
It is known as a logic bomb.
It is known as a back door.
It is known as a Trojan horse.
It is known as software exploit.
Rate this question:
This can be accomplished by viewing the from line of the e-mails.
This can be accomplished by reviewing anti-virus logs on the ex employees computer.
This can be accomplished by replying to the e-mail and checking the destination e-mail address.
This can be accomplished by looking at the source IP address in the SMTP header of the e-mails.
Rate this question:
You should make use of Automatic updates.
You should make use of Input validation.
You should make use of Signed applets.
You should make use of Nested loops.
Rate this question:
A worm can be transmitted without user intervention.
A virus can be transmitted without user intervention.
A logic bomb can be transmitted without user intervention.
A Trojan horse can be transmitted without user intervention.
Rate this question:
SYN (Synchronize) flood.
Ping of death attack.
Land attack.
Buffer overflow attack.
None of the Above
Rate this question:
Brute force needs the longest attack time.
Dictionary needs the longest attack time.
Rainbow needs the longest attack time.
Birthday needs the longest attack time.
Rate this question:
Aliasing
Spoofing
Flooding
Redirecting
None of the Above
Rate this question:
The malicious code is known as logic bomb.
The malicious code is known as Trojan horse.
The malicious code is known as honeypot.
The malicious code is known as worm.
Rate this question:
Zero-day algorithm is used to detect unknown viruses.
Heuristic analysis is used to detect unknown viruses.
Random scanning is used to detect unknown viruses.
Quarantining is used to detect unknown viruses.
Rate this question:
Hostile code.
Social engineering.
IP (Internet Protocol) spoofing.
Man in the middle attack.
Rate this question:
It can result in the Buffer overflow attack.
It can result in the Dictionary attack.
It can result in the Birthday attack.
It can result in the Common Gateway Interface (CGI) script attack.
Rate this question:
Man in the middle attack.
Ciphertext only attack.
Birthday attack.
Brute force attack.
Rate this question:
Investigate the e-mail as a possible hoax with a reputable anti-virus vendor.
Immediately search for and delete the file if discovered.
Broadcast a message to the entire organization to alert users to the presence of a virus.
Locate and download a patch to repair the file.
Rate this question:
Port 3389
Port 8080
Port 143
Port 23
Rate this question:
You should identify a Smurf attack.
You should identify a XMAS Tree attack.
You should identify a Replay attack.
You should identify a Fraggle attack
Rate this question:
Check for the file and delete it immediately.
Check for the file, delete it immediately and copy the e-mail to all distribution lists.
Report the contents of the message to the network administrator.
Ignore the message. This is a virus hoax and no action is required
Rate this question:
Trojan horse
Back door
Logic bomb
Virus
Rate this question:
This can be accomplished by using SNMP.
This can be accomplished by using SMTP.
This can be accomplished by using CHAP.
This can be accomplished by using DHCP.
Rate this question:
Quiz Review Timeline (Updated): Sep 14, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.