Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Quiz 28: Threats
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
David is concerned about the security of his organization's web server. He wants to find and block all open, vulnerable ports on his web server. Which of the following tools should he use to find all open ports on the network?
Question 2
Multiple Choice
Which of the following transmission media is least susceptible to a vampire tap placed on the line?
Question 3
Multiple Choice
John has detected a breach in security. A hacker is trying to access confidential data from the company's server. What should be done first?
Question 4
Multiple Choice
Which of the following logs should you look for if you want to find out when the workstation was last shutdown?
Question 5
Multiple Choice
Which of the following is a server placed in a corporate network for the purpose of attracting a potential intruder's attention?
Question 6
Multiple Choice
Which of the following terms describes the process of improving security?
Question 7
Multiple Choice
John is a security advisor at his organization. A number of anonymous users are complaining about data being stolen from their computers. Which of the following should he enforce to avoid data theft?
Question 8
Multiple Choice
David has just switched on his system and opened a word document. Surprisingly, the dialer started dialing the internet. What kind of an attack has probably occurred?
Question 9
Multiple Choice
John is investigating a situation where an internal user's PC has been hacked by another internal user in the organization. Which of the following locations should he check to determine the source of the attack?
Question 10
Multiple Choice
Which of the following password-guessing attacks continue attacking until a successful guess occurs?
Question 11
Multiple Choice
Which of the following is a Bluetooth-based attack that relates to gaining unauthorized access through a Bluetooth connection?
Question 12
Multiple Choice
Which of the following best describes domain name kiting?
Question 13
Multiple Choice
Jack is investigating the cause of his company's failure in winning the bid for a project. He suspects that a hacker could have intervened in the communication session between his company's employees. Which of the following attack types is he investigating on?
Question 14
Multiple Choice
John is a Security Administrator at his organization. He is observing repeated unsuccessful attempts from a hacker to submit a Kerberos certificate and have it be validated by the authentication system. What is this attack called?
Question 15
Multiple Choice
David is the Security Administrator at his organization. He is investigating an issue where the corporate server will not accept any connections using the TCP protocol. On close inspection he sees that the server indicates that it has exceeded its session limit. Which type of attack is this?
Question 16
Multiple Choice
Which protocol does the smurf attack use to attack a network or system?
Question 17
Multiple Choice
You are working as a Security Advisor at your organization. On observing an employee's system log files report, you notice unsuccessful ongoing attempts to gain access to a single user account on the computer. What is this attack called?