Uploaded by Devyoung

Sec+ 2

advertisement
ExamCompass
CompTIA Practice Exams
(/./)
CompTIA Security+ Certification Exam SY0-601 Practice Test 2
 What is a PUP? (Select 3 answers)
   A type of computer program not explicitly classified as malware by AV software ( Your answer)
   An application downloaded and installed without the user's consent (illegal app) ( Your answer)
   A type of software that may adversely affect the computer's security and performance,
compromise user's privacy, or display unsolicited ads ( Your answer)
   An application downloaded and installed with the user's consent (legal app) ( Missed)
   A type of computer program explicitly classified as malware by AV applications
   A type of free, utility software often bundled with a paid app
 Your answer to this question is incorrect or incomplete.
 Which type of malware resides only in RAM?
   Rootkit ( Your answer)
   Fileless virus ( Missed)
   Backdoor
   Logic bomb
 Your answer to this question is incorrect or incomplete.
 What is the function of a C2 server?
   Spam distribution
   Botnet control ( Your answer)
   Authentication, Authorization, and Accounting (AAA)
   Penetration testing
 You correctly answered this question.
 A malware-infected network host under remote control of a hacker is commonly referred to as:
   Trojan
   Worm
   Bot ( Your answer)
   Honeypot
 You correctly answered this question.
 Which of the following applies to a collection of intermediary compromised systems that can be
used as a platform for a DDoS attack?
   Botnet ( Your answer)
   Intranet
   Honeynet
   Extranet
 You correctly answered this question.
 Which of the following is an example of cryptomalware?
   Backdoor
   Ransomware ( Your answer)
   Keylogger
   Rootkit
 You correctly answered this question.
 Malicious code activated by a specific event is called:
   Spyware
   Backdoor
   Rootkit
   Logic bomb ( Your answer)
 You correctly answered this question.
 Malicious software collecting information about users without their knowledge/consent is known
as:
   Cryptomalware
   Adware
   Ransomware
   Spyware ( Your answer)
 You correctly answered this question.
 Which of the following is an example of spyware?
   Keylogger ( Your answer)
   Vulnerability scanner
   Computer worm
   Packet sniffer
 You correctly answered this question.
 Which type of Trojan enables unauthorized remote access to a compromised system?
   pcap
   RAT ( Your answer)
   MaaS
   pfSense
 You correctly answered this question.
 A collection of software tools used by a hacker to mask intrusion and obtain administrator-level
access to a computer or computer network is known as:
   Rootkit ( Your answer)
   Spyware
   Backdoor
   Trojan
 You correctly answered this question.
 Which of the following refers to an undocumented (and often legitimate) way of gaining access
to a program, online service, or an entire computer system?
   Logic bomb
   Trojan horse ( Your answer)
   Rootkit
   Backdoor ( Missed)
 Your answer to this question is incorrect or incomplete.
 A short list of commonly used passwords tried against large number of user accounts is a
characteristic feature of:
   Replay attack
   Dictionary attack
   Spraying attack ( Your answer)
   Birthday attack
 You correctly answered this question.
 Which password attack bypasses account-lockout policies?
   Birthday attack
   Spraying attack ( Your answer)
   Dictionary attack
   Replay attack
 You correctly answered this question.
 Which password attack takes advantage of a predefined list of words?
   Birthday attack
   Replay attack
   Dictionary attack ( Missed)
   Brute-force attack ( Your answer)
 Your answer to this question is incorrect or incomplete.
 One of the measures for bypassing the failed logon attempt account lockout policy is to capture
any relevant data that might contain the password and brute force it offline.
   True ( Your answer)
   False
 You correctly answered this question.
 An attack against encrypted data that relies heavily on computing power to check all possible
keys and passwords until the correct one is found is known as:
   Replay attack
   Brute-force attack ( Your answer)
   Dictionary attack
   Birthday attack
 You correctly answered this question.
 Rainbow tables are lookup tables used to speed up the process of password guessing.
   True ( Your answer)
   False
 You correctly answered this question.
 Which of the following refers to the contents of a rainbow table entry?
   Hash/Password ( Your answer)
   IP address/Domain name
   Username/Password
   Account name/Hash
 You correctly answered this question.
 In cryptography, the term "Plaintext" is used to describe data in an unencrypted form.
   True ( Your answer)
   False
 You correctly answered this question.
 Due to added functionality in its plug, malicious USB cable can be used for:
   GPS tracking
   Capturing keystrokes ( Your answer)
   Sending and receiving commands
   Delivering and executing malware
   Any of the above ( Missed)
 Your answer to this question is incorrect or incomplete.
 Which of the following terms is used to describe the theft of personal data from a payment
card?
   Pivoting
   Skimming ( Your answer)
   Phishing
   Bluejacking
 You correctly answered this question.
 The practice of making an unauthorized copy of a payment card is referred to as:
   Rooting
   Cloning ( Your answer)
   Replication
   Copying
 You correctly answered this question.
 An AI feature that enables it to accomplish tasks based on training data without explicit human
instructions is called:
   API
   ML ( Your answer)
   RAD
   VR
 You correctly answered this question.
 Which cryptographic attack relies on the concepts of probability theory?
   KPA
   Brute-force
   Dictionary
   Birthday ( Your answer)
 You correctly answered this question.
Your Final Report
Total marks
27
Total Questions
25
Questions correctly answered
20
Success ratio
80%
Marks secured
22
Percentage secured
81.48%
Security+
Download