CompTIA Security Test 1
CompTIA Security Test 1
CompTIA Security Test 1
Adware
Malware ( Your answer)
Ransomware
Spyware
You correctly answered this question.
Which of the following statements apply to the definition of a computer virus? (Select 3
answers)
Backdoor
Ransomware ( Your answer)
Keylogger
Rootkit
You correctly answered this question.
Malware that restricts access to a computer system by encrypting files or locking the
entire system down until the user performs requested action is known as:
Grayware
Adware
Ransomware ( Your answer)
Spyware
You correctly answered this question.
A standalone malicious computer program that typically propagates itself over a
computer network to adversely affect system resources and network bandwidth is
called:
Spyware
Worm ( Your answer)
Trojan
Spam
You correctly answered this question.
A type of software that performs unwanted and harmful actions in disguise of a
legitimate and useful program is known as a Trojan horse. This type of malware may act
like a legitimate program and have all the expected functionalities, but apart from that it
will also contain a portion of malicious code that the user is unaware of.
True ( Your answer)
False
You correctly answered this question.
A collection of software tools used by a hacker to mask intrusion and obtain
administrator-level access to a computer or computer network is known as:
Rootkit ( Your answer)
Spyware
Backdoor
Trojan
You correctly answered this question.
Which of the following answers lists an example of spyware?
Keylogger ( Your answer)
Vulnerability scanner
Computer worm
Packet sniffer
You correctly answered this question.
What is adware?
Unsolicited or undesired electronic messages
Malicious program that sends copies of itself to other computers on the network
Software that displays advertisements ( Your answer)
Malicious software that collects information about users without their knowledge
You correctly answered this question.
Malicious software collecting information about users without their knowledge/consent
is known as:
Crypto-malware
Adware
Ransomware
Spyware ( Your answer)
You correctly answered this question.
A malware-infected networked host under remote control of a hacker is commonly
referred to as:
Trojan
Worm
Bot ( Your answer)
Honeypot
You correctly answered this question.
Which of the terms listed below applies to a collection of intermediary compromised
systems that are used as a platform for a DDoS attack?
Honeynet
Botnet ( Your answer)
Quarantine network
Malware
You correctly answered this question.
Which type of Trojan enables unauthorized remote access to a compromised system?
pcap
RAT ( Your answer)
MaaS
pfSense
You correctly answered this question.
Malicious code activated by a specific event is called:
Backdoor
Logic bomb
Trojan horse
Rootkit
Backdoor ( Your answer)
You correctly answered this question.
An unauthorized practice of obtaining confidential information by manipulating people
into disclosing sensitive data is referred to as:
Shoulder surfing
Privilege escalation
Social engineering ( Your answer)
Penetration testing
You correctly answered this question.
A fraudulent email requesting its recipient to reveal sensitive information (e.g.
username and password) used later by an attacker for the purpose of identity theft is an
example of: (Select all that apply)
Phishing ( Your answer)
Phishing ( Your answer)
Privilege escalation
Backdoor access
Shoulder surfing
You correctly answered this question.
Phishing scams targeting a specific group of people are referred to as:
Vishing ( Your answer)
Spear phishing ( Missed)
Spoofing
Whaling
Your answer to this question is incorrect or incomplete.
Phishing scams targeting people holding high positions in an organization or business
are known as:
Vishing
Bluesnarfing
Whaling ( Your answer)
Bluejacking
Pharming
You correctly answered this question.
The practice of using a telephone system to manipulate user into disclosing confidential
information is called:
Whaling
Spear phishing
Vishing ( Your answer)
Pharming
You correctly answered this question.
What is tailgating?
Impersonation ( Your answer)
Dumpster diving
Watering hole attack
Shoulder surfing
You correctly answered this question.
In computer security, the term "Dumpster diving" is used to describe a practice of sifting
through trash for discarded documents containing sensitive data. Found documents
containing names and surnames of the employees along with the information about
positions held in the company and other data can be used to facilitate social
engineering attacks. Having the documents shredded or incinerated before disposal
makes dumpster diving less effective and mitigates the risk of social engineering
attacks.
True ( Your answer)
False
You correctly answered this question.
A situation in which an unauthorized person can view another user's display or
keyboard to learn their password or other confidential information is referred to as:
Spear phishing
Tailgating
Shoulder surfing ( Your answer)
Spoofing
You correctly answered this question.
Your Final Report
Total marks 28
Total Questions 25