option
Cuestiones
ayuda
daypo
buscar.php

Comptia Security +

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
Comptia Security +

Descripción:
Preguntitas

Fecha de Creación: 2019/08/29

Categoría: Informática

Número Preguntas: 52

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: Adware. Malware. Ransomware. Spyware.

Which of the following statements apply to the definition of a computer virus? (Select 3 answers). A self-replicating computer program containing malicious segment. Requires its host application to be run to make the virus active. A standalone malicious computer program that replicates itself over a computer network. Can run by itself without any interaction. Attaches itself to an application program or other executable component. A self-contained malicious program or code that does need a host to propagate itself.

Which of the terms listed below refers to an example of a crypto-malware?. Backdoor. Ransomware. Keylogger. Rootkit.

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: Grayware. Adware. Ransomware. Spyware.

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: Spyware. Worm. Trojan. Spam.

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. True. False.

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as. Rootkit. Spyware. Backdoor. Trojan.

Which of the following answers lists an example of spyware?. Keylogger. Vulnerability scanner. Computer worm. Packet sniffer.

What is adware?. Unsolicited or undesired electronic messages. Malicious program that sends copies of itself to other computers on the network. Software that displays advertisements. Malicious software that collects information about users without their knowledge.

Malicious software collecting information about users without their knowledge/consent is known as: Crypto-malware. Adware. Ransomware. Spyware.

A malware-infected networked host under remote control of a hacker is commonly referred to as: Trojan. Worm. Bot. Honeypot.

Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?. Honeynet. Botnet. Quarantine network. Malware.

Which type of Trojan enables unauthorized remote access to a compromised system?. pcap. RAT. MaaS. pfSense.

Malicious code activated by a specific event is called: Backdoor. Logic bomb. Dropper. Retrovirus.

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?. Logic Bomb. Trojan horse. Rootkit. Backdoor.

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as: Shoulder surfing. Privilege escalation. Social engineering. Penetration testing.

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select all that apply). Phishing. Watering hole attack. Social engineering. Bluejacking. Vishing.

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: Phishing. Privilege escalation. Backdoor access. Shoulder surfing.

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: Phishing. Privilege escalation. Backdoor access. Shoulder surfing.

Phishing scams targeting a specific group of people are referred to as: Vishing. Spear phishing. Spoofing. Whaling.

Phishing scams targeting people holding high positions in an organization or business are known as: Vishing. Bluesnarfing. Whaling. Bluejacking. Pharming.

The practice of using a telephone system to manipulate user into disclosing confidential information is called: Whaling. Spear phishing. Vishing. Pharming.

What is tailgating?. Acquiring unauthorized access to confidential data. Looking over someone's shoulder to get information. Gaining unauthorized access to restricted areas by following another person. Manipulating a user into disclosing confidential information.

Which social engineering attack relies on identity theft?. Impersonation. Dumpster diving. Watering hole attack. Shoulder surfing.

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks. True. False.

A situation in which an unauthorized person can view another user's display or keyboard to learn their password or other confidential information is referred to as: Spear phishing. Tailgating. Shoulder surfing. Spoofing.

Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing. True. False.

An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files falsely identified as malware, and/or prompting them to share the message with others would be an example of: Vishing. Impersonation. Virus Hoax. Phishing.

Which of the terms listed below refers to a platform used for watering hole attacks?. Mail gateways. Websites. PBX systems. Web browsers.

An attacker impersonates a company's managing staff member to manipulate a lower rank employee into disclosing confidential data. The attacker informs the victim that the information is essential for a task that needs to be completed within the business hours on the same day and mentions potential financial losses for the company in case the victim refuses to comply. Which social engineering principles apply to this attack scenario? (Select 3 answers). Urgency. Familiarity. Authority. Consensus. Intimidation. Scarcity.

An attacker impersonating a software beta tester replies to a victim's post in a forum thread discussing the best options for affordable productivity software. A while later, he/she follows up by sending the victim private message mentioning the discussion thread and offering free access to a closed beta version of a fake office app. Which social engineering principles apply to this attack scenario? (Select 3 answers). Authority. Intimidation. Consensus. Scarcity. Familiarity. Trust. Urgency.

While conducting a web research that would help in making a better purchasing decision, a user visits series of Facebook pages and blogs containing fake reviews and testimonials in favor of a paid app intentionally infected with malware. Which social engineering principle applies to this attack scenario?. Scarcity. Authority. Consensus. Intimidation. Urgency.

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is called: Bluesnarfing. MITM attack. Session hijacking. DoS attack.

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet. True. False.

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?. Zero-day attack. MITM attack. Watering hole attack. Replay attack.

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as: IV attack. SQL injection. Buffer overflow. Fuzz test.

Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?. Replay attacks. SQL injection attacks. Brute-force attacks. Dictionary attacks.

Cross-site request forgery (CSRF/XSRF) is a security exploit that allows for infecting a website with malicious code. The malicious code, often in the form of JavaScript, can then be sent to the unsuspecting user and executed via the user's web browser application. True. False.

Which type of attack allows for tricking a user into sending unauthorized commands to a web application? (Select 2 answers). IRC. CSRF. XSS. XSRF. CSR.

Which of the following facilitate(s) privilege escalation attacks? (Select all that apply). System/application vulnerability. Distributed Denial of Service (DDoS). Social engineering techniques. Attribute-Based Access Control (ABAC). System/application misconfiguration.

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?. ARP poisoning. Replay attack. Cross-site request forgery. DNS poisoning.

Which of the attack types listed below relies on the amplification effect?. Zero-day attack. DDoS attack. Brute-force attack. MITM attack.

Remapping a domain name to a rogue IP address is an example of what kind of exploit?. DNS poisoning. Domain hijacking. ARP poisoning. URL hijacking.

The term "Domain hijacking" refers to a situation in which a domain registrant due to unlawful actions of third parties loses control over his/her domain name. True. False.

Which of the terms listed below refers to a computer security exploit that takes advantage of vulnerabilities in a user's web browser application?. MTTR. MITM. MTBF. MITB.

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called: Xmas attack. Zero-day attack. IV attack. Replay attack.

A replay attack occurs when an attacker intercepts user data and tries to use this information later to impersonate the user to obtain unauthorized access to resources on a network. True. False.

A technique that allows an attacker to authenticate to a remote server without extracting a cleartext password from the digest and use the digest instead of a password credential is known as: Pass the hash. Replay attack. Hash collision. Rainbow table.

In computer security, the term "Clickjacking" refers to a malicious technique of tricking a user into clicking on something different from what the user thinks they are clicking on. True. False.

In a session hijacking attack, a hacker takes advantage of the session ID stored in: Key escrow. Digital signature. Cookie. Firmware.

Which type of attack allows for tricking a user into sending unauthorized commands to a web application? (Select 2 answers). IRC. CSRF. XSS. XSRF. CSR.

Which of the answers listed below refers to a common target of cross-site scripting (XSS)?. Physical security. Alternate sites. Dynamic web pages. Removable storage.

Denunciar Test